Eng308 Mock Exam.docx
Document Details
Full Transcript
**Question 1:** **Which one of the following does not belong to ICT infrastructure?** A. Big data B. Cloud computing **C. Power grid** (Correct answer) D. IoT **Question 2:** **Which one of the following is not Huawei\'s 5G basic service application?** A. UAV **B. Telemedicine** (Correct an...
**Question 1:** **Which one of the following does not belong to ICT infrastructure?** A. Big data B. Cloud computing **C. Power grid** (Correct answer) D. IoT **Question 2:** **Which one of the following is not Huawei\'s 5G basic service application?** A. UAV **B. Telemedicine** (Correct answer) C. XR D. Photography-level video **Question 3:** **What is the TTI when the subcarrier spacing is 60 kHz?** A. 1 B. 0.5 **C. 0.25** (Correct answer) D. 0.125 **Question 4:** **Which one of the following about the C-V2X sidelink is correct?** A. The Uu interface is of the sidelink type. **B. The PC5 interface is of the sidelink type** (Correct answer). C. The sidelink refers to the link used for communication between the terminal and the network. D. The Um interface is of the sidelink type. **Question 5:** **In 5G eMBB scenarios, which one of the following coding schemes is used on air interface control channels?** A. Convolutional code B. Turbo C. LDPC **D. Polar** (Correct answer) **Question 6:** **If the reliability of a single connection is 98%, what is the reliability of dual connections in active/standby mode?** A. 96.04% B. 98% C. 99% **D. 99.96% (Correct answer)** **Question 7:** **Which one of the following resources does not belong to cloud computing infrastructure?** A. Computing resources **B. Radio resources (Correct answer)** C. Network resources D. Storage resources **Question 8:** **Which one of the following is an external security threat to 5G networks?** A. DoS attacks on the NRF result in service registration failures. B. Malicious apps attack the MEC platform or UPF VNF. C. Communication data transmitted between NFs is eavesdropped and tampered with. **D. Security threats to network roaming (Correct answer)** **Question 9:** **Which one of the following about Option 3x is correct?** A. The core network is the NGC. **B. LTE serves as the signaling anchor (Correct answer)** C. The data split point is at the core network. D. NR and LTE radio links cannot coexist. **Question 10:** **Which one of the following generations of mobile communications technologies brings humankind into the mobile Internet era?** A. 2G B. 3G **C. 4G (Correct answer)** D. 5G **Question 11:** **Which one of the following about D2D communication is incorrect?** A. Using the remaining resources of the cellular cell B. Reusing the downlink resources of the cellular cell C. Reusing the uplink resources of the cellular cell **D. Working under the coverage of the base station (Correct answer)** **Question 12:** **Which one of the following about intelligent distributed power distribution automation is incorrect?** A. Millisecond-level ultra-low latency B. High reliability C. Isolation from other services **D. Ultra-high throughput (Correct answer)** **Question 13:** **Which one of the following about 5G network slicing is incorrect?** A. Independent service operation **B. Doubled energy efficiency (Correct answer)** C. Guaranteed SLA D. Security isolation **Question 14:** **Which one of the following about the Cloud XR is incorrect?** A. Cloud VR uses cloud rendering. B. Video VR requires high bandwidth. **C. Cloud VR terminals use complex technologies and are costly (Correct answer)** D. CG VR requires low latency. **Question 15:** **Which one of the following 3GPP releases defines NR-V2X for the first time?** A. R14 B. R15 **C. R16 (Correct answer)** D. R17 **Question 16:** **Which one of the following about the MEC benefits is incorrect?** A. MEC can reduce service latency. B. MEC can improve data security and privacy. **C. MEC increases network load (Correct answer)** D. MEC can move data computing and storage from the core to the edge. **Question 17:** **Which one of the following is not a big data technology?** A. Data collection and preprocessing B. Data storage and management C. Data processing and analysis **D. Data forwarding (Correct answer)** **Question 18:** **Which one of the following about the C-V2X is incorrect?** **A. C-V2X is an IEEE-based communications technology for the internet of vehicles (IoV) (Correct answer)** B. C-V2X includes LTE-V2X. C. C-V2X includes LTE-eV2X. D. C-V2X includes NR-V2X. **Question 19:** **Which one of the following modulation schemes is added to the uplink in 3GPP Release 15 compared with LTE?** A. 64QAM B. 128QAM **C. 256QAM (Correct answer)** D. 1024QAM **Question 20:** **Which one of the following about the 5G co-construction and sharing is incorrect?** **A. Operators share the core network (Correct answer)** B. Operators share the base station. C. Operators share the transport network. D. The indoor distribution system is constructed in key indoor distribution scenarios. **Question 21:** **To implement the local application of MEC, which one of the following is not the usual choice for MEC platform deployment?** A. Enterprise campus DC B. Base station equipment room C. Edge DC **D. Core DC** **Question 22:** **Which one of the following NGC network functions implements authentication management?** A. AMF **B. AUSF** C. UDM D. SMF **Question 23:** **Which one of the following frequency ranges does sub-3 GHz belong to?** A. VHF **B. UHF** C. SHF D. EHF **Question 24:** **Which one of the following technologies can be used to improve the spectrum utilization of F-OFDM?** **A. Filter optimization** B. Carrier bandwidth expansion C. Subcarrier spacing expansion D. TTI shortening **Question 25:** **Which one of the following is correct about the current industrial Internet communication solution?** A. The Bluetooth deployment cost is high. B. The deployment cost of the dedicated industrial wireless communication is low. **C. The Wi-Fi communication technology has security risks and interference.** D. The 4G cellular network supports massive connections and low latency. **Question 26:** **Which one of the following technologies is first defined in 3GPP Release 15?** A. LTE-V2X B. NR-V2X C. mMTC **D. SA** **Question 27:** **Which one of the following about the RSU is incorrect?** A. The RSU supports road information broadcast and extends IoV services. B. The RSU communicates with the network through the Uu interface. C. The RSU communicates with vehicles through the PC5 interface. **D. The communication between the RSU and vehicles belongs to the V2N scenario.** **Question 28:** **Which one of the following about machine learning is correct?** A. A large number of computer hardware resources are required. B. It is suitable for training with a large amount of data. C. The machine automatically selects features. **D. Features are easy to interpret.** **Question 29:** **Which one of the following scenarios is not suitable for deep learning application?** A. Computer vision B. Natural language processing **C. Charging system** D. Speech recognition **Question 30:** **Which one of the following about the massive MIMO is incorrect?** A. Massive MIMO is more suitable for high frequency bands. **B. Massive MIMO is more suitable for FDD.** C. Massive MIMO can reduce interference. D. Massive MIMO can increase cell capacities. **Question 31:** **Which of the following are advantages of 5G in UAV low-altitude communication?** **A. High bandwidth** (correct answer) **B. Low-altitude 3D network** (correct answer) **C. High reliability** (correct answer) **D. Low latency** (correct answer) **Question 32:** **Which of the following are Huawei\'s basic 5G service capabilities?** **A. Autonomous management** (correct answer) B. Remote control **C. Quick service provisioning** (correct answer) **D. Mobility** (correct answer) **Question 33:** **Which of the following about the 5G and Wi-Fi 6 are incorrect?** A. The 5G network supports handover. B. The 5G network has a stronger anti-interference capability. **C. Wi-Fi 6 has a larger coverage range.** (correct answer) **D. Wi-Fi 6 does not support the multi-antenna technology.** (correct answer) **Question 34:** **Which of the following are long-distance wireless technologies used in IoT?** **A. NB-IoT** (correct answer) **B. eMTC** (correct answer) **C. LoRa** (correct answer) D. Wi-Fi **Question 35:** **Which of the following are 5GtoB application scenarios?** **A. Finance** (correct answer) B. Smart home **C. Healthcare** (correct answer) **D. Media** (correct answer) **Question 36:** **Which of the following are correct about the evolution trend of the industrial Internet?** **A. Automatic equipment replaces manual operations.** (correct answer) **B. 5G replaces the industrial bus.** (correct answer) **C. Terminal algorithms are stored on the cloud.** (correct answer) D. Different devices are mutually isolated. **Question 37:** **Which of the following statements about C-V2X application scenarios are correct?** A. Vehicle platooning is a basic scenario defined by C-V2X. **B. Remote driving is an advanced scenario defined by C-V2X.** (correct answer) C. Crossroad collision warning is an advanced scenario defined by C-V2X. **D. Speed limit reminder is a basic scenario defined by C-V2X.** (correct answer) **Question 38:** **Which of the following statements about electromagnetic waves are correct?** **A. The lower the frequency, the smaller the propagation loss.** (correct answer) B. The lower the frequency, the smaller the coverage distance. **C. The lower the frequency, the stronger the diffraction capability.** (correct answer) **D. The higher the frequency, the richer the frequency resources.** (correct answer) **Question 39:** **Which of the following can be used to ensure the air interface throughput?** **A. Resource reservation** (correct answer) **B. Super Uplink** (correct answer) C. Larger subcarrier spacing D. MEC deployment **Question 40:** **Which of the following statements about fake base stations are correct?** **A. Unidirectional authentication on the 2G network makes it difficult to solve the problem of fake base stations.** (correct answer) **B. Bidirectional authentication is used on the 3G, 4G, and 5G networks.** (correct answer) C. The 5G network can perfectly defend against downgrade attacks from fake base stations on the 2G network. **D. To prevent information leakage of specific users, the core network can reject the IMSI fallback of the users.** (correct answer) **Question 41:** **Which of the following are correct about digital economy scenarios?** A. Agricultural automation **B. Digital industrialization** (correct answer) **C. Digital governance** (correct answer) **D. Industry digitalization** (correct answer) **Question 42:** **Which of the following are information interaction modes of the IoV?** **A. V2V (correct answer)** **B. V2P (correct answer)** **C. V2I (correct answer)** **D. V2N (correct answer)** **Question 43:** **Which of the following are incorrect about key features of cloud computing?** **A. Long capacity expansion period (correct answer)** B. On-demand self-service C. Pay-per-use **D. Location-related cloud services (correct answer)** **Question 44:** **Which of the following are wireless communication modes?** A. Dial-up access B. Fixed-line phone **C. Pager (correct answer)** **D. Mobile broadband (correct answer)** **Which of the following are correct about IoT communication technologies?** **A. LoRa uses unlicensed frequency bands (correct answer)** **B. NB-IoT can reuse existing 4G base stations (correct answer)** **C. eMTC uses licensed frequency bands, with little network interference (correct answer)** D. NB-IoT uses unlicensed frequency bands, with strong network interference **Question 46:** **Which of the following frequency bands belong to 5G FR1?** **A. Sub-3 GHz (correct answer)** B. mmWave **C. C-band (correct answer)** D. 28 GHz **Question 47:** **5G guarantees autonomous driving using edge computing and slicing technologies.** **True (correct answer)** False **Question 48:** **International Telecommunication Union (ITU) defines the usable frequency range of electromagnetic waves as 300 kHz to 300 GHz.** True **False (correct answer)** **Question 49:** **The sub-3 GHz uplink spectrum can be used together with the C-band spectrum in time division multiplexing mode to increase uplink spectrum resources.** **True (correct answer)** False **Question 50:** **In MEC scenarios, resource preemption between apps is a potential security threat.** **True (correct answer)** False **Question 51:** **If mmWave and C-band are co-sited, the throughput of mmWave signals is lower than that of C-band signals because the loss of mmWave signals is greater than that of C-band signals.** True **False (correct answer)** **Question 52:** **The IoT specifically refers to information connection between things by using NB-IoT wireless technologies.** True **False (correct answer)** **Question 53:** **Currently, the digital economy is transforming from the consumption Internet to the industry Internet.** **True (correct answer)** False **Question 54:** **In a smart grid, the communication in power consumption is mainly wireless.** **True (correct answer)** False **Question 55:** **The details of 5G technical specifications are formulated by ITU.** True **False (correct answer)** **Question 56:** **eMBB services are the focus in the early stage of 5G commercial use, including ultra-HD video and VR/AR services.** **True (correct answer)** False **Question 57:** **mMTC specifications are frozen in 3GPP Release 16.** True **False (correct answer)** **Question 58:** **In roaming scenarios on 5G networks, the secure edge protection proxy (SEPP) can be used to filter messages and hide topologies.** **True (correct answer)** False **Question 59:** **Coordinated beamforming (CBF) coordinates the beam direction of UEs in intra-frequency neighboring cells so that non-edge UEs help CEUs in neighboring cells to avoid beam interference.** **True (correct answer)** False **Question 60:** **DSRC communication modes include vehicle-to-vehicle communication and pedestrian-to-vehicle communication.** True **False (correct answer)** **Question 61:** **Industry applications are the key to 5G commercial success.** **True (correct answer)** False **After a user powers on the mobile phone, the mobile phone automatically accesses the network through the base station and transport network. After performing authentication and registration, the core network allocates an IP address and a bearer to the user. (True or False)** **A. True (correct answer)** B. False **In June 2015, the International Telecommunication Union (ITU) defined three 5G use cases: enhanced Mobile Broadband (eMBB), ultra-reliable low-latency communication (URLLC), and Massive Machine-Type Communications (mMTC). (True or False)** **A. True (correct answer)** B. False **To implement end-to-end slicing, the network must use NFV and SDN technologies. (True or False)** A. True **B. False (correct answer)** **64T has outstanding vertical coverage capabilities and provides better user experience for users above the 10th floor. Its capacity is 1.3 to 1.4 times that of 32T. 64T also provides better in-depth coverage, and its edge rate is 1.3 times that of 32T. Therefore, 64T is preferentially used to replace all 32T sites for network optimization. (True or False)** A. True **B. False (correct answer)**