Pass the Nokia Nokia Bell Labs 5G Certification - Associate BL0-100 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the main benefit of Cloud RAN?

Options:

A.

Increased cell coverage


B.

Better latency


C.

Reduced cost by centralizing some radio functionalities


D.

Increase radio throughput


Questions # 2:

Which function best helps reduce Edge Cloud management costs?

Options:

A.

Smart Metering


B.

Containers


C.

Orchestration


D.

Hardware acceleration


Questions # 3:

What is the primary benefit of Edge Cloud?

Options:

A.

Lower latency


B.

Higher Availability


C.

Larger Bandwidth


D.

Lower Cost


Questions # 4:

The network of the future is the key to supporting the digitization and automation of many industries. This network should support diverse requirements from different applications using it. To do that, the network should have a new architecture. Which of the following best describe the elements of the new 5G end-to-end network architecture?

Options:

A.

Wireless Access, Optical Transport, and a dedicated Core Network for wireless access running in a Central Cloud.


B.

Multiple access types (not only wireless), Optical Transport, Multi-cloud, and dedicated Core for every type of access.


C.

Public sector element, a smart city element, a health element, a transport and logistics element, and an industrial element.


D.

Massive Scale Access combining many wireless and wired access types, Smart Network Fabric as transport (combining optical and IP network elements, controlled by SDN), a Universal Adaptive Core network supporting all access types, a Multi-cloud system including central, regional, edge, public, private, and hybrid cloud, and Automation and Analytics providing flexibility in the network to serve different applications.


Questions # 5:

A rental car company wants to offer a service to their clients where the renter can leave a self-driving car wherever they want when the rental period is up. A company operator will then remotely drive the left vehicles back to the rental location. Where should the application for remote car control and driving reside and why?

Options:

A.

It should run in the central cloud as latency is not very important here. Reliability is guaranteed by the central cloud.


B.

The application should run in the central cloud, with very high access throughput to support low latency.


C.

It should be installed locally on the car computer and the company operator should remotely connect to it. This approach is more secure.


D.

It should be running in the edge cloud because latency is very important for the remote control of vehicles in motion and also for reliability purposes.


Questions # 6:

Many 5G use cases require the network to provide very high capacity in the order of 10 Gb/s. What are the 3 different methods that can be used to increase capacity in the wireless interface?

Options:

A.

more cells

bigger cells

more spectrum


B.

more cells

high energy

more antennas


C.

more spectrum

high spectral efficiency

higher cell density


D.

use higher spectrum bands

restrict number of devices connected wirelessly

bigger cells


Questions # 7:

Resource elasticity in Cloud enables which of the following actions? (Choose two.)

Options:

A.

Relocate VMs between data centers when a fault is detected.


B.

Deploy VMs across data centers when a new slice is needed.


C.

Add resources to existing VMs when traffic is high.


D.

Add VMs when traffic is high.


Questions # 8:

Which of the following is a valid NFV attack?

Options:

A.

Hijack attack on hypervisor


B.

DDoS attack on the SDN switches


C.

Poor NFV implementation


D.

Hypervisor resources leakage


Questions # 9:

What is the Authentication Server Function (AUSF)?

Options:

A.

This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.


B.

This network function supports authentication for 3GPP and non-3GPP accesses.


C.

This network function exposes 5G Core network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).


D.

This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.


Questions # 10:

How is a slice identified in the network?

Options:

A.

By the single network slice assistance information (S-NSSAI).


B.

By the QoS class ID (QCI).


C.

By the assigned customer and the slice IDs (CU-S-ID).


D.

By the customer ID (CU-ID).


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions