28% OFF Automatically For You
Nokia Bell Labs 5G Foundation
1.Which of the following technologies drive 5G increased throughput capacity?
A. MU-MIMO and beamforming
B. Higher spectral efficiency
C. Network Slicing
D. Multi-connectivity per User Equipment
2.Which of the following is a valid NFV attack?
A. Hijack attack on hypervisor
B. DDoS attack on the SDN switches
C. Poor NFV implementation
D. Hypervisor resources leakage
3.Which of the following statements about Network Slicing are correct? (Choose
A. Multiple slices create multiple virtual network instances.
B. Unique Quality of Service can be allocated to a given slice.
C. Specific resources can be allocated to a given slice.
D. Network Slicing is a way to physically partition the common network infrastructure.
4.What is the best solution for deploying an optimal network function distribution?
A. Using duplicated Virtual Network Functions
B. Using Virtual Network Functions to control the routing
C. Using Virtual Network Functions orchestrated across various Cloud Data Centers
D. Using Virtual Network Functions in Access
5.What are the benefits of the stateless or state-efficient aspects of network
A. Avoid massive database corruption
B. Provide real time access to the databases
C. Enable scalability and extreme resiliency in the 5G Core
D. Ensure the database integrity
6.What is Unified Data Management (UDM)?
A. This network function stores or retrieves subscriptions, profiles and authentication
data to or from the data repositories. It offers services to the AMF, SMF, NEF and
AUSF using the Service Based Interf