nokia bl0-100 practice test

Exam Title: Nokia Bell Labs End-to-End 5G Foundation Exam

Last update: Nov 27 ,2025
Question 1

Which one of the following requires a network service package defined in a catalog?

  • A. Cloud software platform
  • B. Cloud infrastructure software
  • C. Cloud orchestration
  • D. Software defined network
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

What does the acronym SOAR stand for?

  • A. Security Orchestration Automation and Recovery
  • B. Security Optimization Accountability Recovery
  • C. Security Orchestration Automation and Response
  • D. Securitization, Optimization, Access Control, and Resiliency
Answer:

C


Explanation:
Reference: https://www.fireeye.com/products/helix/what-is-soar.html

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which of the following is not a component of the 5G Flexible RAN architecture?

  • A. Radio Unit
  • B. Distributed Unit
  • C. Centralized Unit
  • D. Optical Unit
Answer:

D


Explanation:
Reference: https://www.hindawi.com/journals/wcmc/2019/5264012/

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

A company is planning to offer services to different cities worldwide so drones can be used to scan
disaster areas to help identify victims’ locations quickly, organize evacuations efficiently, and save
lives. Drones will be connected to a 5G network. The company is planning to offer two applications
running in the cloud – one to manage drones through remote control while the other offers live
video streaming to drone operators. As a 5G professional, you are asked what are the network
requirements for those two applications?

  • A. The drone control application needs very low latency to maneuver around obstacles, while the video application would need less latency. Both applications would be running in the central cloud.
  • B. The drone control application needs low latency and high reliability from the network and should run in the edge cloud. The video application needs higher throughput but it is not sensitive from the latency and reliability point of view. It can run in a central cloud.
  • C. Both applications should run in the edge cloud because the drone control and video applications both require low latency and high reliability from the network.
  • D. The drone control application should run through a central cloud. The video streaming application should run in the edge cloud because it carries much data, and that is expensive to run through the central cloud.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

What is the purpose of the secondary authentication feature?

  • A. To improve authentication between the User Equipment and the 5G Core.
  • B. To improve authentication when connecting to different network slices.
  • C. To authenticate the User Equipment coming from an untrusted non-3GPP access (N3IWF).
  • D. To authenticate the User Equipment with an external data network.
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which of the following technologies drive 5G increased throughput capacity? (Choose three.)

  • A. MU-MIMO and beamforming
  • B. Higher spectral efficiency
  • C. Network Slicing
  • D. Multi-connectivity per User Equipment
Answer:

ABC


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

What are the benefits of the stateless or state-efficient aspects of network functions?

  • A. Avoid massive database corruption
  • B. Provide real time access to the databases
  • C. Enable scalability and extreme resiliency in the 5G Core
  • D. Ensure the database integrity
Answer:

C


Explanation:
Reference: https://www.nokia.com/about-us/news/releases/2018/01/29/nokia-implements-future-
x-network- architecture-for-5g-to-deliver-breakthrough-network-performance-and-reduce-costs/

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following defines a vertical Network Slice?

  • A. When it serves a given customer for a specific purpose, such as a national energy network.
  • B. When it cross all the network layers from the radio up to the core.
  • C. When it serves a given common purpose, for a use case with a defined QoS (eg a use case in transportation, in energy).
  • D. When it operates on the same layer of the ISO/OSI model.
Answer:

A


Explanation:
Reference: https://www.gsma.com/futurenetworks/wp-content/uploads/2018/06/Network-Slicing-
Use-Case- Requirements-_-FInal-.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

What are the benefits of traffic engineering in Transport networks? (Choose three.)

  • A. Scaling access points
  • B. Better utilization of network capacity
  • C. Traffic steering
  • D. Resiliency
Answer:

BCD


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Which of the following is a valid NFV attack?

  • A. Hijack attack on hypervisor
  • B. DDoS attack on the SDN switches
  • C. Poor NFV implementation
  • D. Hypervisor resources leakage
Answer:

A


Explanation:
Reference:
https://www.etsi.org/deliver/etsi_gs/nfv-sec/001_099/001/01.01.01_60/gs_nfv-
sec001v010101p.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 6
Viewing questions 1-10 out of 65
Go To
page 2