Exam Code : BL0-100
Exam Name : Nokia Bell Labs 5G Foundation
Vendor Name :
"Nokia"
BL0-100 Dumps
BL0-100 Braindumps BL0-100 Real Questions BL0-100 Practice Test
BL0-100 Actual Questions
killexams.com
Nokia Bell Labs 5G Foundation
https://killexams.com/pass4sure/exam-detail/BL0-100
What is the maximum distance of an Edge Cloud from end-user? A. 1,000 KM
5,000 KM
10,000 KM
300 KM
SOAR can be seen as a tool for which of the following? Select the best answer.
SDN intrusion control
NFV overload control
Security Operation Center
IoT attack prevention
Answer: D
Question: 15
What is the purpose of the secondary authentication feature?
To improve authentication between the User Equipment and the 5G Core.
To improve authentication when connecting to different network slices.
To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
To authenticate the User Equipment with an external data network.
What are the five key features of 5G Core?
Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self- healing
Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing
Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network Slicing
Control and User Planes Separation, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing
Which one of the following requires a network service package defined in a catalog?
Cloud software platform
Cloud infrastructure software
Cloud orchestration
Software defined network
Which of the following best defines what is meant by Network Slice isolation?
Security + Cloud isolation
Resource + Security isolation
Transport + Cloud isolation
Resource + Traffic isolation
Explanation:
Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case- Requirements-_-FInal-.pdf
The network of the future is the key to supporting the digitization and automation of many industries. This network should support diverse requirements from different applications using it. To do that, the network should have a new architecture.
Which of the following best describe the elements of the new 5G end-to-end network architecture?
Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud.
Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access.
Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element.
Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications.
Which of the following is not a component of a 5G Transport Network?
Fronthaul Core
Access Backhaul
Metropolitan or Regional Core
Backbone Core
Answer: D
Explanation:
Which of the following statements about Network Slicing are correct? (Choose three.)
Multiple slices create multiple virtual network instances.
Unique Quality of Service can be allocated to a given slice.
Specific resources can be allocated to a given slice.
Network Slicing is a way to physically partition the common network infrastructure.
What is the Authentication Server Function (AUSF)?
This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
This network function supports authentication for 3GPP and non-3GPP accesses.
This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
Which of the following is not a component of the 5G Flexible RAN architecture?
Radio Unit
Distributed Unit
Centralized Unit
Optical Unit
Answer: D
Explanation:
Reference: https://www.hindawi.com/journals/wcmc/2019/5264012/
What functionality is applied by SDN to find an alternative path in case of failure in the Transport Network?
Path Correlation Engine
Alternative Route Finding
Alternative Path Computing
Path Computation Engine
Explanation:
Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwj01tmp5uTvAhUQO8AKHbvUB5c QFjAAegQIBxAD&url=https%3A%2F%2Fwww.mdpi.com%2F2071-1050%2F12%2F10%2F4255% 2Fpdf&usg=AOvVaw2Jd6iravRnpP8tfxjIdKWK
How many slices can a User Equipment be connected simultaneously with 4G Core based network?
1
8
unlimited
4