BL0-100 Dumps BL0-100 Braindumps BL0-100 Real Questions BL0-100 Practice Test BL0-100 Actual Questions Nokia BL0-100 Nokia Bell Labs 5G Foundation https://killexams.com/pass4sure/exam-detail/BL0-100 Question: 13 What is the maximum distance of an Edge Cloud from end-user? A. 1,000 KM B. 5,000 KM C. 10,000 KM D. 300 KM Answer: A Question: 14 SOAR can be seen as a tool for which of the following? Select the best answer. A. SDN intrusion control B. NFV overload control C. Security Operation Center D. IoT attack prevention Answer: D Question: 15 What is the purpose of the secondary authentication feature? A. To improve authentication between the User Equipment and the 5G Core. B. To improve authentication when connecting to different network slices. C. To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF). D. To authenticate the User Equipment with an external data network. Answer: A Question: 16 What are the five key features of 5G Core? A. Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self- healing B. Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing C. Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network Slicing D. Control and User Planes Separation, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing Answer: A Question: 17 Which one of the following requires a network service package defined in a catalog? A. Cloud software platform B. Cloud infrastructure software C. Cloud orchestration D. Software defined network Answer: C Question: 18 Which of the following best defines what is meant by Network Slice isolation? A. Security + Cloud isolation B. Resource + Security isolation C. Transport + Cloud isolation D. Resource + Traffic isolation Answer: B Explanation: Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case- Requirements-_-FInal-.pdf Question: 19 The network of the future is the key to supporting the digitization and automation of many industries. This network should support diverse requirements from different applications using it. To do that, the network should have a new architecture. Which of the following best describe the elements of the new 5G end-to-end network architecture? A. Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud. B. Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access. C. Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element. D. Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications. Answer: D Question: 20 Which of the following is not a component of a 5G Transport Network? A. Fronthaul Core B. Access Backhaul C. Metropolitan or Regional Core D. Backbone Core Answer: D Explanation: Reference: https://www.nokia.com/about-us/news/releases/2017/11/13/nokia-unveils-cloud-packet-core-to-enable-5g-services/ Question: 21 Which of the following statements about Network Slicing are correct? (Choose three.) A. Multiple slices create multiple virtual network instances. B. Unique Quality of Service can be allocated to a given slice. C. Specific resources can be allocated to a given slice. D. Network Slicing is a way to physically partition the common network infrastructure. Answer: A,B,C Question: 22 What is the Authentication Server Function (AUSF)? A. This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data. B. This network function supports authentication for 3GPP and non-3GPP accesses. C. This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF). D. This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface. Answer: B Question: 23 Which of the following is not a component of the 5G Flexible RAN architecture? A. Radio Unit B. Distributed Unit C. Centralized Unit D. Optical Unit Answer: D Explanation: Reference: https://www.hindawi.com/journals/wcmc/2019/5264012/ Question: 24 What functionality is applied by SDN to find an alternative path in case of failure in the Transport Network? A. Path Correlation Engine B. Alternative Route Finding C. Alternative Path Computing D. Path Computation Engine Answer: C Explanation: Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwj01tmp5uTvAhUQO8AKHbvUB5c QFjAAegQIBxAD&url=https%3A%2F%2Fwww.mdpi.com%2F2071-1050%2F12%2F10%2F4255% 2Fpdf&usg=AOvVaw2Jd6iravRnpP8tfxjIdKWK Question: 25 How many slices can a User Equipment be connected simultaneously with 4G Core based network? A. 1 B. 8 C. unlimited D. 4 Answer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