Pass4itsure > Nokia > Nokia Certification > 4A0-M10 > 4A0-M10 Online Practice Questions and Answers

4A0-M10 Online Practice Questions and Answers

Questions 4

Which of the following statements regarding cloud RAN architecture is FALSE?

A. The gNB is split into three functional modules: a radio unit (RU), a distributed unit (DU), and a centralized unit (CU).

B. DU performs the non-real time processing of layer 2.

C. The fronthaul segment connects RU to DU and the midhaul segment connects DU to CU.

D. CU can be deployed in the cloud as a VNF.

Buy Now
Questions 5

Which of the following does NOT apply to an idle UE in MICO mode?

A. The UE performs registration updates.

B. The UE connects to the network to send uplink data.

C. Power and signaling efficiency is optimized for the UE.

D. The UE listens and responds to paging.

Buy Now
Questions 6

Which of the following statements about 5G NG-RAN is FALSE?

A. The Xn interface is used to connect gNB to ng-eNB.

B. The NG interface is used to connect ng-eNB to UPF.

C. The Xn interface is used to connect ng-eNB to AMF.

D. The NG interface is used to connect gNB to NGC.

Buy Now
Questions 7

Which of the following statements about QoS profiles used in 5G is FALSE?

A. SMF derives the QoS profile of a QoS Flow from a PCC rule and sends it to NG-RAN.

B. NG-RAN uses the QoS profiles to create mapping between QoS Flow IDs and data radio bearers.

C. NG-RAN sends the QoS profiles and corresponding QoS Flow IDs to the UE.

D. Each QoS profile includes a 5G QoS Identifier (5QI) and an Allocation and Retention Priority (ARP).

Buy Now
Questions 8

Which of the following statements about network slice selection assistance information (NSSAI) is FALSE?

A. Allowed NSSAI is a set of slices provided to UE by AMF during UE registration procedure.

B. Requested NSSAI is a set of slices provided by UE to the network and contains values from serving PLMN.

C. Subscribed NSSAI is a set of slices specified in the UE subscription data and contains only home PLMN values.

D. Configured NSSAI is a set of slices configured on the AMF and contains slices supported per tracking area.

Buy Now
Questions 9

Which of the following actions is NOT performed during an Xn-based Inter NG-RAN Handover with I-UPF Insertion procedure?

A. AMF determines that a new I-UPF needs to be added for a PDU session.

B. SMF provides N3 tunnel info of I-UPF to target gNB via AMF.

C. SMF provides N9 tunnel info of UPF PSA to I-UPF.

D. SMF provides N9 tunnel info of I-UPF to UPF PSA.

Buy Now
Questions 10

Which of the following statements about session aggregate maximum bit rate (session-AMBR) is FALSE?

A. Session-AMBR limits the aggregate bit rate provided across all non-GBR QoS Flows of a PDU session.

B. SMF calculates the session-AMBR value to be enforced.

C. The UPF that terminates the N6 interface enforces the session-AMBR value in the downlink direction.

D. NG-RAN enforces the session-AMBR in the uplink direction.

Buy Now
Questions 11

In which of the following scenarios is the Service Request procedure performed?

A. A deregistered UE needs to register with the network.

B. A registered UE receives a paging request from the network.

C. A registered UE needs to establish a new PDU session.

D. A deregistered UE needs to connect to the network using non-3GPP access.

Buy Now
Questions 12

Which of the following statements about the downlink user plane data flow in Option 3X is FALSE?

A. Data packets of bearers that do not use dual connectivity are sent from EPC to UE through eNB.

B. When NR coverage is good, data packets of bearers that use dual connectivity are sent from EPC to UE using secondary cell group bearers.

C. When NR coverage degrades, the gNB decides when to use split bearers and send some of the packets received from the core through eNB.

D. When NR coverage is poor, data packets of bearers that use dual connectivity are sent to the UE through eNB.

Buy Now
Questions 13

Which of the following statements about the protection of service-based interfaces (SBIs) is FALSE?

A. The transport layer security (TLS) performs certification-based authentication, providing connection security between network functions within a PLMN.

B. The OAuth 2.0 framework is used to secure the communication between network functions within a PLMN at the network layer.

C. The network domain security/Internet protocol (NDS/IP) provides confidentiality and data integrity between network functions within a PLMN.

D. The security edge protection proxy (SEPP) handles the security of inter-domain SBIs and protects the interaction between network functions in different PLMNs.

Buy Now
Exam Code: 4A0-M10
Exam Name: Nokia 5G Packet Core Architecture
Last Update:
Questions: 40
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99