This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Sat Apr 12 13:33:14 2025 / +0000 GMT ___________________________________________________ Title: [UPDATED 2023] Free Nokia 4A0-M10 Exam Questions Self-Assess Preparation [Q14-Q29] --------------------------------------------------- [UPDATED 2023] Free Nokia 4A0-M10 Exam Questions Self-Assess Preparation 4A0-M10 Free Sample Questions to Practice One Year Update NO.14 Which of the following statements about N2-based handover in 5GS is FALSE?  Handover signaling messages are exchanged between source and target NG-RAN nodes through AMF.  The serving AMF determines if it can continue to serve the UE and select a target AMF when required.  The serving SMF determines if the UPF terminating N3 can continue to serve the UE and selects a target I-UPF when required.  The SMF decides whether a direct or indirect downlink data forwarding path is to be used. NO.15 Which of the following statements regarding the 5G security components is FALSE?  The authentication credential repository and processing function (ARPF) selects the authentication method to use for the UE.  The authentication server function (AUSF) handles authentication requests for both 3GPP and non-3GPP access.  The security anchor function (SEAF) makes the final decision on UE authentication.  The security identifier de-concealing function (SIDF) decrypts the UE’s SUCI to obtain its corresponding SUPI. NO.16 Which of the following statements about the protection of service-based interfaces (SBIs) is FALSE?  The transport layer security (TLS) performs certification-based authentication, providing connection security between network functions within a PLMN.  The OAuth 2.0 framework is used to secure the communication between network functions within a PLMN at the network layer.  The network domain security/Internet protocol (NDS/IP) provides confidentiality and data integrity between network functions within a PLMN.  The security edge protection proxy (SEPP) handles the security of inter-domain SBIs and protects the interaction between network functions in different PLMNs. NO.17 Which of the following statements most accurately describes the SDF templates used in 5G?  SDF templates are used by UE to map uplink traffic to QoS Flows.  SDF templates are used by NG-RAN to map QoS Flows to data radio bearers.  SDF templates are used by NG-RAN to map QoS Flows to N3 GTP-U tunnels.  SDF templates are used by UPF to map downlink traffic to QoS Flows. NO.18 Which of the following statements about QoS profiles used in 5G is FALSE?  SMF derives the QoS profile of a QoS Flow from a PCC rule and sends it to NG-RAN.  NG-RAN uses the QoS profiles to create mapping between QoS Flow IDs and data radio bearers.  NG-RAN sends the QoS profiles and corresponding QoS Flow IDs to the UE.  Each QoS profile includes a 5G QoS Identifier (5QI) and an Allocation and Retention Priority (ARP). NO.19 Which of the following best describes a UE route selection policy (URSP)?  A URSP is a policy pre-configured in the UE. The UE uses this policy to select a non-3GPP access network and an N3IWF to use in the PLMN.  A URSP is a policy provisioned to AMF by PCF. The AMF uses this policy to select an SMF that can serve a given PDU session for the UE.  A URSP is a policy that can be pre-configured in the UE or provisioned to the UE by PCF. The UE uses this policy to determine how to handle a given application.  A URSP is a policy pre-configured on the SMF. The SMF uses this policy to select a UPF that can serve a given PDU session for the UE. NO.20 Which of the following actions is NOT performed when handling an uplink data packet?  UE maps the uplink data packet to a QoS Flow based on QoS rules received from SMF.  UE maps the QoS Flow identifier to a data radio bearer based on QFI-to-DRB mapping received from NG-RAN.  NG-RAN marks the data packet with the proper DSCP value.  NG-RAN removes the QoS Flow identifier from the packet header and forwards the packet over the proper N3 GTP-U tunnel. NO.21 A UE has a PDU session established using slice 1. The operator removes slice 1 from the UE subscription data stored in UDM. Which of the following actions is NOT performed as a result?  UDM notifies the serving AMF about the UE subscription data modification.  AMF initiates the UE configuration update procedure.  AMF requests the UE to release the established PDU session.  UE updates its slicing information with the data received from AMF. NO.22 NF A wants to explicitly subscribe for event notifications at NFB.Which of the following actions regarding this mechanism is FALSE?  NF A acts as a service consumer and NF B acts as a service producer.  NF A includes a subscription identifier in the request message sent to NF B.  NF A includes a callback URI in the request message sent to NF B.  NF A includes event filtering criteria in the request message sent to NF B. NO.23 Which of the following statements about Option 3X dual connectivity is FALSE?  VoLTE traffic is handled by the LTE network.  Dual connectivity is used for high throughput services such as eMBB.  When NR radio quality becomes sub-optimal, gNB decides to split the bearer.  Both eNB and gNB are connected with S1-U interfaces to SGW. NO.24 The exhibit below illustrates signaling messages exchanged during a 5GS to EPS Handover procedure using N26. Which information is NOT provided to AMF in step 6 for a PDU session that supports interworking?  PGW-U indirect data forwarding tunnel info for the corresponding PDN connection  PGW-C S5-C tunnel info for the corresponding PDN connection  PGW-U S5-U tunnel info for each EPS bearer  EPS bearer ID and QoS parameters for each EPS bearer NO.25 Which 5GS network function allows UE connectivity to 5GC through non-3GPP access networks?  SEPP  N3IWF  NWDAF  NEF NO.26 Which of the following statements about session aggregate maximum bit rate (session-AMBR) is FALSE?  Session-AMBR limits the aggregate bit rate provided across all non-GBR QoS Flows of a PDU session.  SMF calculates the session-AMBR value to be enforced.  The UPF that terminates the N6 interface enforces the session-AMBR value in the downlink direction.  NG-RAN enforces the session-AMBR in the uplink direction. NO.27 Which of the following statements about non-access stratum mobility management (NAS-MM) protocol is TRUE?  It runs between the UE and the SMF.  It is used to control user plane resources between the UE and a data network.  It provides common procedures such as authentication, identification, and UE configuration update.  NAS-MM messages are relayed transparently by the AMF. NO.28 A UE triggers an initial registration procedure to use services offered by a 5G network. Which of the following actions is NOT performed as a result of this procedure?  AMF interacts with AUSF to authenticate the UE.  AMF interacts with PCF to create an AM (access and mobility) policy association.  AMF retrieves the UE AM (access and mobility) and SM (session management) data from UDM.  AMF allocates a 5G-GUTI and includes it in the Registration Accept message sent to UE. NO.29 Which of the following is NOT an EDCE5 core enhancement to support Option 3X?  Support for higher data rates for EPC interfaces.  MME selection of appropriate gateways capable of supporting NR.  PGW selection of appropriate PCRF that supports 5G policies.  Controlled UE access to NR based upon subscription information.  Loading … Real exam questions are provided for Nokia Cloud Packet Core Expert tests, which can make sure you 100% pass: https://www.braindumpsit.com/4A0-M10_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-03-08 13:56:22 Post date GMT: 2023-03-08 13:56:22 Post modified date: 2023-03-08 13:56:22 Post modified date GMT: 2023-03-08 13:56:22