Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the best solution for deploying an optimal network function distribution?

A.

Using duplicated Virtual Network Functions

B.

Using Virtual Network Functions to control the routing

C.

Using Virtual Network Functions orchestrated across various Cloud Data Centers

D.

Using Virtual Network Functions in Access

What is the “sweet spot” for Industry 4.0?

A.

The “sweet spot” for industry 4.0 is the intersection of URLLC, eMBB and mMTC.

B.

The “sweet spot” for industry 4.0 is a double-digit revenue growth.

C.

The “sweet spot” for industry 4.0 is a deployment strategy for delivering the required capacity and coverage for industrials.

D.

The “sweet spot” for industry 4.0 is the intersection of operational, information and communications technologies.

A company is planning to offer services to different cities worldwide so drones can be used to scan disaster areas to help identify victims’ locations quickly, organize evacuations efficiently, and save lives. Drones will be connected to a 5G network. The company is planning to offer two applications running in the cloud – one to manage drones through remote control while the other offers live video streaming to drone operators. As a 5G professional, you are asked what are the network requirements for those two applications?

A.

The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.

B.

The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.

C.

Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.

D.

The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.

In a 5G Transport network, the encryption protection of the user and control plane are provided by which of the following?

A.

IPSec

B.

Access Control List

C.

SSH

D.

X25

You have a trainee at your company and you are mentoring him. The trainee came across the term "Network Slicing”. He asks you what is "Network Slicing" and why do we need it?

A.

Network Slicing is just like the OSI model. It is the division of the network into layers horizontally from the physical to the application. It is needed to specify which layer a service resides.

B.

Network Slicing is a technology that allows the network to serve applications with different sets of requirements in terms of latency, reliability, capacity, density, and such. Every application has a set of requirements different from others. With network slicing, we give every application what it needs from the network.

C.

Network Slicing is an end-to-end “virtual private service”, extending across access, transport, core, and cloud. It is a general term used to define in which piece of the network we are.

D.

Network slicing is a new technology to divide the network among users. It is needed for confidentiality purposes.

Which of the following is a valid NFV attack?

A.

Hijack attack on hypervisor

B.

DDoS attack on the SDN switches

C.

Poor NFV implementation

D.

Hypervisor resources leakage

Which of the following are the elements that drive Access capacity growth? (Choose three.)

A.

Support of wireless backhauling

B.

Integration of 4G and Wi-Fi radio in 5G access

C.

More micro, small and ultra-small cells

D.

5G Home box can provide 5G wireless access

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)

A.

MU-MIMO and beamforming

B.

Higher spectral efficiency

C.

Network Slicing

D.

Multi-connectivity per User Equipment

What is the Network Repository Function (NRF)?

A.

This network function is part of data repositories in the Common Data Layer and in opposition to the UDR, it stores non-standardized - unstructured — data.

B.

This network function is part of data repositories in the Common Data Layer. It stores 3GPP standardized data.

C.

This network function stores or retrieves subscriptions, profiles and authentication data to or from the data repositories. It offers services to the AMF, SMF, NEF and AUSF using the Service Based Interface.

D.

This network function provides registration and discovery functionality to enable other network functions/services to discover and communicate with each other.