BL00100-101-E Dumps BL00100-101-E Braindumps BL00100-101-E Real Questions BL00100-101-E Practice Test BL00100-101-E Actual Questions Nokia BL00100-101-E Nokia Bell Labs End-to-End 5G Foundation https://killexams.com/pass4sure/exam-detail/BL00100-101-E Question: 81 What are the benefits of traffic engineering in Transport networks? (Choose three.) A. Scaling access points B. Better utilization of network capacity C. Traffic steering D. Resiliency Answer: B,C,D Question: 82 Which of the following defines a vertical Network Slice? A. When it serves a given customer for a specific purpose, such as anational energy network. B. When it cross all the network layers from the radio up to the core. C. When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy). D. When it operates on the same layer of the ISO/OSI model. Answer: A,C Explanation: Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-Use-Case-Requirements-_-FInal-.pdf Question: 83 Your manager started a brainstorming session during a meeting on how automation can be driven in the network. He asks what tools can be used to increase automated services in the network. What would you answer be? A. We need to find a software company that will write software to automate the network services. B. We can create rule-based automation. We can also use Artificial Intelligence and Machine Learning to automate all network services. C. We can write scripts that will be executed at certain times when a specific event happens and the service will be automated in this way. D. We can use big data. It is the main tool that should be used for network automation. Answer: B Question: 84 Which one of the following requires a network service package defined in a catalog? A. Cloud software platform B. Cloud infrastructure software C. Cloud orchestration D. Software defined network Answer: C Question: 85 Which of the following statements are applicable to the technology of massive MIMO? (Select 3) A. Several data flows are sent at the same time on the same frequency. B. The signals on each antenna are made orthogonal. C. The data flows are sent at the same time on different frequencies. D. Transmit diversity is used in case of poor radio conditions. Answer: A,B,D Question: 86 What is the best solution for deploying an optimal network function distribution? A. Using duplicated Virtual Network Functions B. Using Virtual Network Functions to control the routing C. Using Virtual Network Functions orchestrated across various Cloud Data Centers D. Using Virtual Network Functions in Access Answer: C Question: 87 What are the five key features of 5G Core? A. Dynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self-healing B. Dynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing C. Dynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network Slicing D. Control and User Planes Separation, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing Answer: A Question: 88 What functionality is applied by SDN to find an alternative path in case of failure in the Transport Network? A. Path Correlation Engine B. Alternative Route Finding C. Alternative Path Computing D. Path Computation Engine Answer: A,B,C,D Explanation: Reference: https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwj01tmp5uTvAhUQO8AKHbvUB5cQFjAAegQIBxAD&url=https%3A%2F%2Fwww.mdpi.com%2F2071- 1050%2F12%2F10%2F4255% 2Fpdf&usg=AOvVaw2Jd6iravRnpP8tfxjIdKWK Question: 89 What is the Unstructured Data Storage Function (UDSF)? A. This network function exposes 5G Core Network functionalities available to 3rd parties, so that 3rdparty capabilities and events may be securely exposed by the Network Exposure Function (NEF). B. This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data. C. This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized C Unstructured C data. D. This network function stores or retrieves subscriptions, profiles, and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface. Answer: A Question: 90 Which of the following are 4G limitations that justify a roll-out to 5G? (Choose three.) A. Low peak and end-user-experience throughput B. Low reliability C. High latency D. Beamforming is not supported Answer: A,B Explanation: Reference: https://www.raconteur.net/technology/5g/4g-vs-5g-mobile-technology/ 6$03/( 48(67,216 7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV .LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP $FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP ([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP 3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV *XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV 8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV 7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\ 'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU .LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG