Free 4A0-M10 Exam Braindumps (page: 4)

Page 3 of 11

Which of the following statements regarding the 5G security components is FALSE?

  1. The authentication credential repository and processing function (ARPF) selects the authentication method to use for the UE.
  2. The authentication server function (AUSF) handles authentication requests for both 3GPP and non-3GPP access.
  3. The security anchor function (SEAF) makes the final decision on UE authentication.
  4. The security identifier de-concealing function (SIDF) decrypts the UE's SUCI to obtain its corresponding SUPI.

Answer(s): D


Reference:

https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.02.00_60/ts_133501v150200p.pdf



Which of the following statements about N2-based handover in 5GS is FALSE?

  1. Handover signaling messages are exchanged between source and target NG-RAN nodes through AMF.
  2. The serving AMF determines if it can continue to serve the UE and select a target AMF when required.
  3. The serving SMF determines if the UPF terminating N3 can continue to serve the UE and selects a target I- UPF when required.
  4. The SMF decides whether a direct or indirect downlink data forwarding path is to be used.

Answer(s): C



Which of the following best describes a UE route selection policy (URSP)?

  1. A URSP is a policy pre-configured in the UE. The UE uses this policy to select a non-3GPP access network and an N3IWF to use in the PLMN.
  2. A URSP is a policy provisioned to AMF by PCF. The AMF uses this policy to select an SMF that can serve a given PDU session for the UE.
  3. A URSP is a policy that can be pre-configured in the UE or provisioned to the UE by PCF. The UE uses this policy to determine how to handle a given application.
  4. A URSP is a policy pre-configured on the SMF. The SMF uses this policy to select a UPF that can serve a given PDU session for the UE.

Answer(s): C


Reference:

https://itectec.com/spec/6-6-ue-policy-information/



NF A wants to explicitly subscribe for event notifications at NF B. Which of the following actions regarding this mechanism is FALSE?

  1. NF A acts as a service consumer and NF B acts as a service producer.
  2. NF A includes a subscription identifier in the request message sent to NF
  3. NF A includes a callback URI in the request message sent to NF B.
  4. NF A includes event filtering criteria in the request message sent to NF B.

Answer(s): C






Post your Comments and Discuss Nokia 4A0-M10 exam with other Community members:

4A0-M10 Discussions & Posts