Which of the following statements regarding cloud RAN architecture is FALSE?
A. The gNB is split into three functional modules: a radio unit (RU), a distributed unit (DU), and a centralized unit (CU).
B. DU performs the non-real time processing of layer 2.
C. The fronthaul segment connects RU to DU and the midhaul segment connects DU to CU.
D. CU can be deployed in the cloud as a VNF.
Which of the following does NOT apply to an idle UE in MICO mode?
A. The UE performs registration updates.
B. The UE connects to the network to send uplink data.
C. Power and signaling efficiency is optimized for the UE.
D. The UE listens and responds to paging.
Which of the following statements about 5G NG-RAN is FALSE?
A. The Xn interface is used to connect gNB to ng-eNB.
B. The NG interface is used to connect ng-eNB to UPF.
C. The Xn interface is used to connect ng-eNB to AMF.
D. The NG interface is used to connect gNB to NGC.
Which of the following statements about QoS profiles used in 5G is FALSE?
A. SMF derives the QoS profile of a QoS Flow from a PCC rule and sends it to NG-RAN.
B. NG-RAN uses the QoS profiles to create mapping between QoS Flow IDs and data radio bearers.
C. NG-RAN sends the QoS profiles and corresponding QoS Flow IDs to the UE.
D. Each QoS profile includes a 5G QoS Identifier (5QI) and an Allocation and Retention Priority (ARP).
Which of the following statements about network slice selection assistance information (NSSAI) is FALSE?
A. Allowed NSSAI is a set of slices provided to UE by AMF during UE registration procedure.
B. Requested NSSAI is a set of slices provided by UE to the network and contains values from serving PLMN.
C. Subscribed NSSAI is a set of slices specified in the UE subscription data and contains only home PLMN values.
D. Configured NSSAI is a set of slices configured on the AMF and contains slices supported per tracking area.
Which of the following actions is NOT performed during an Xn-based Inter NG-RAN Handover with I-UPF Insertion procedure?
A. AMF determines that a new I-UPF needs to be added for a PDU session.
B. SMF provides N3 tunnel info of I-UPF to target gNB via AMF.
C. SMF provides N9 tunnel info of UPF PSA to I-UPF.
D. SMF provides N9 tunnel info of I-UPF to UPF PSA.
Which of the following statements about session aggregate maximum bit rate (session-AMBR) is FALSE?
A. Session-AMBR limits the aggregate bit rate provided across all non-GBR QoS Flows of a PDU session.
B. SMF calculates the session-AMBR value to be enforced.
C. The UPF that terminates the N6 interface enforces the session-AMBR value in the downlink direction.
D. NG-RAN enforces the session-AMBR in the uplink direction.
In which of the following scenarios is the Service Request procedure performed?
A. A deregistered UE needs to register with the network.
B. A registered UE receives a paging request from the network.
C. A registered UE needs to establish a new PDU session.
D. A deregistered UE needs to connect to the network using non-3GPP access.
Which of the following statements about the downlink user plane data flow in Option 3X is FALSE?
A. Data packets of bearers that do not use dual connectivity are sent from EPC to UE through eNB.
B. When NR coverage is good, data packets of bearers that use dual connectivity are sent from EPC to UE using secondary cell group bearers.
C. When NR coverage degrades, the gNB decides when to use split bearers and send some of the packets received from the core through eNB.
D. When NR coverage is poor, data packets of bearers that use dual connectivity are sent to the UE through eNB.
Which of the following statements about the protection of service-based interfaces (SBIs) is FALSE?
A. The transport layer security (TLS) performs certification-based authentication, providing connection security between network functions within a PLMN.
B. The OAuth 2.0 framework is used to secure the communication between network functions within a PLMN at the network layer.
C. The network domain security/Internet protocol (NDS/IP) provides confidentiality and data integrity between network functions within a PLMN.
D. The security edge protection proxy (SEPP) handles the security of inter-domain SBIs and protects the interaction between network functions in different PLMNs.