What is the Unstructured Data Storage Function (UDSF)?
AThis network function exposes 5G Core Network functionalities available to 3rd parties, so that 3rd party capabilities and events may be securely exposed by the Network Exposure Function (NEF).
BThis network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
CThis network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized – Unstructured – data.
DThis network function stores or retrieves subscriptions, profiles, and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
What is the maximum distance of an Edge Cloud from end-user?
A1,000 KM
B5,000 KM
C10,000 KM
D300 KM
Resource elasticity in Cloud enables which of the following actions? (Choose two.)
ARelocate VMs between data centers when a fault is detected.
BDeploy VMs across data centers when a new slice is needed.
CAdd resources to existing VMs when traffic is high.
DAdd VMs when traffic is high.
What is the main benefit of Cloud RAN?
AIncreased cell coverage
BBetter latency
CReduced cost by centralizing some radio functionalities
DIncrease radio throughput
Which of the following statements about 5G Transport is incorrect?
AWidely diverse end to end services will require the ability to create a Transport Slice with guaranteed SLAs.
BUltra Reliable Machine to Machine communication will require dependable low latency communication.
CInternet of things devices will require a massive increase in network connectivity.
DExplosive traffic growth will require statically defined manually configured end to end QoS based services.
Question 6
Foundation of security
0
Question 7
Foundation of 5G networking
Question 8
The 5G imperative
Question 9
The 5G imperative
Question 10
Foundation of 5G networking
Question 11
The 5G imperative
Question 12
Foundation of 5G networking
Question 13
Foundation of 5G industrial automation
Question 14
Foundation of 5G industrial automation
Question 15
Foundation of 5G networking
Question 16
Foundation of 5G networking
Question 17
Foundation of security
Question 18
Foundation of network slicing
Question 19
Foundation of 5G networking
Question 20
Foundation of distributed cloud
Question 21
Foundation of network slicing
Question 22
The 5G imperative
Question 23
The 5G imperative
Question 24
Foundation of network slicing
Question 25
Foundation of network slicing
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
What is the purpose of the secondary authentication feature?
ATo improve authentication between the User Equipment and the 5G Core.
BTo improve authentication when connecting to different network slices.
CTo authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
DTo authenticate the User Equipment with an external data network.
What is Unified Data Management (UDM)?
AThis network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
BThis network function supports authentication for 3GPP and non-3GPP accesses.
CThis network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized unstructured data.
DThis network function provides registration and discovery functionality to enable other network functions/services to discover and communicate with each other.
In terms of scalability, flexibility, and capacity, which of the following would overcome 4G limitations?
AService based architecture, stateless network functions, Cloud-ready network functions and modular network functions.
CClient/Server architecture, Cloud-ready network functions, and modular network functions.
Which of the following drive 5G higher reliability?
AHigher spectral efficiency
BMulti-connectivity per User Equipment
CConnectionless radio access
DLower Time Transmission Interval (TTI)
What functionality is applied by SDN to find an alternative path in case of failure in the Transport Network?
APath Correlation Engine
BAlternative Route Finding
CAlternative Path Computing
DPath Computation Engine
Which of the following drive 5G low latency? (Choose two.)
ASupport of up to 1 billion of IoT and sensors devices per km2
BLower Time Transmission Interval (TTI)
CHigher spectral efficiency
DEdge Clouds
What are the five key features of 5G Core?
ADynamic Control plane, Adaptive Architecture, Converged-Access-Network, Stateless and Network Self-healing
BDynamic Control plane, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing
CDynamic Control plane, Adaptive Architecture, Multi-Access-Network, Stateless and Network Slicing
DControl and User Planes Separation, Service Based Architecture, Multi-Access-Network, State-efficiency and Network Slicing
You are working in a logistics company. Your manager is telling you that automation is very important to create more opportunities for the company. His idea is to deliver parcels using drones. With this in mind, he asks you if a 4G network provides good connectivity for controlling the delivery drones. How would you answer him and why?
AYes, 4G provides a connectivity network but, it is quite expensive. WIFI may be a preferable option.
BNo, a 4G network is not a good choice for drone control because big operators (with whom we cannot deal) mainly deliver it.
CNo, a 4G network cannot deliver the required connectivity. It is not able to guarantee the latency and reliability required for drone control.
DYes, the drone control application can be hosted in the cloud and the 4G network can provide the speed needed to reach the application and control the drones.
What will 5G bring in terms of supporting requirements of industry automation? (Choose three.)
ALow latency characteristics in the range of 5 to 10 ms for High Speed Discrete Automation Applications.
BLow latency characteristics in the range of 0.1 to 1 ms for Video Monitoring and AR.
CLow latency characteristics in the range of 100 to 200 ms for Remote Control Tele-operation Applications.
DLow latency characteristics in the range of 50 to 100 ms for Discrete and Process Automation Applications.
What is the Network Repository Function (NRF)?
AThis network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized - unstructured — data.
BThis network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.
CThis network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.
DThis network function provides registration and discovery functionality to enable other network functions/services to discover and communicate with each other.
Which deployment option is used by initially deployed 5G non-standalone networks?
AOption 4
BOption 2
COption 3x
DOption 7
SOAR can be seen as a tool for which of the following? Select the best answer.
ASDN intrusion control
BNFV overload control
CSecurity Operation Center
DIoT attack prevention
What is the best way to ensure robust slicing isolation?
ABy implementing resource isolation and security isolation on the network slice
BBy implementing virtual firewall on the network slice
CBy implementing traffic isolation on the network slice
DBy implementing user and control planes separation on the network slice
Which of the following is not a component of a 5G Transport Network?
AFronthaul Core
BAccess Backhaul
CMetropolitan or Regional Core
DBackbone Core
New virtual machines are deployed to support higher leak load for an existing VNF. What is this type of scaling called?
ASpatial
BData Center
CVertical
DHorizontal
How many slices can a User Equipment be connected simultaneously with 4G Core based network?
A1
B8
Cunlimited
D4
Which of the following are the elements that drive Access capacity growth? (Choose three.)
ASupport of wireless backhauling
BIntegration of 4G and Wi-Fi radio in 5G access
CMore micro, small and ultra-small cells
D5G Home box can provide 5G wireless access
In terms of universal access requirements, which of the following would overcome 4G limitations?
AUnified access across 3GPP and non-3GPP technologies, Multi-Access and Wireline-Wireless convergence.
BUniversal database with unstructured data repository and Wireline-Wireless convergence.
CMulti-Access and Point-to-point APIs.
DUniversal database with unstructured data repository and Wireline-Wireless convergence.
How is a slice identified in the network?
ABy the single network slice assistance information (S-NSSAI).
BBy the QoS class ID (QCI).
CBy the assigned customer and the slice IDs (CU-S-ID).
DBy the customer ID (CU-ID).
Which of the following is not a part of an E2E Network Slice?