Q1 to Q30 5G Exam Questions - PDF
Document Details
Uploaded by SnazzyRococo
Tags
Summary
This document contains 30 multiple choice questions about 5G technology, covering various topics including infrastructure, applications, security, and more.
Full Transcript
**Question 1:** **Which one of the following does not belong to ICT infrastructure?** A. Big data B. Cloud computing **C. Power grid** (Correct answer) D. IoT **Question 2:** **Which one of the following is not Huawei\'s 5G basic service application?** A. UAV **B. Telemedicine** (Correct an...
**Question 1:** **Which one of the following does not belong to ICT infrastructure?** A. Big data B. Cloud computing **C. Power grid** (Correct answer) D. IoT **Question 2:** **Which one of the following is not Huawei\'s 5G basic service application?** A. UAV **B. Telemedicine** (Correct answer) C. XR D. Photography-level video **Question 3:** **What is the TTI when the subcarrier spacing is 60 kHz?** A. 1 B. 0.5 **C. 0.25** (Correct answer) D. 0.125 **Question 4:** **Which one of the following about the C-V2X sidelink is correct?** A. The Uu interface is of the sidelink type. **B. The PC5 interface is of the sidelink type** (Correct answer). C. The sidelink refers to the link used for communication between the terminal and the network. D. The Um interface is of the sidelink type. **Question 5:** **In 5G eMBB scenarios, which one of the following coding schemes is used on air interface control channels?** A. Convolutional code B. Turbo C. LDPC **D. Polar** (Correct answer) **Question 6:** **If the reliability of a single connection is 98%, what is the reliability of dual connections in active/standby mode?** A. 96.04% B. 98% C. 99% **D. 99.96% (Correct answer)** **Question 7:** **Which one of the following resources does not belong to cloud computing infrastructure?** A. Computing resources **B. Radio resources (Correct answer)** C. Network resources D. Storage resources **Question 8:** **Which one of the following is an external security threat to 5G networks?** A. DoS attacks on the NRF result in service registration failures. B. Malicious apps attack the MEC platform or UPF VNF. C. Communication data transmitted between NFs is eavesdropped and tampered with. **D. Security threats to network roaming (Correct answer)** **Question 9:** **Which one of the following about Option 3x is correct?** A. The core network is the NGC. **B. LTE serves as the signaling anchor (Correct answer)** C. The data split point is at the core network. D. NR and LTE radio links cannot coexist. **Question 10:** **Which one of the following generations of mobile communications technologies brings humankind into the mobile Internet era?** A. 2G B. 3G **C. 4G (Correct answer)** D. 5G **Question 11:** **Which one of the following about D2D communication is incorrect?** A. Using the remaining resources of the cellular cell B. Reusing the downlink resources of the cellular cell C. Reusing the uplink resources of the cellular cell **D. Working under the coverage of the base station (Correct answer)** **Question 12:** **Which one of the following about intelligent distributed power distribution automation is incorrect?** A. Millisecond-level ultra-low latency B. High reliability C. Isolation from other services **D. Ultra-high throughput (Correct answer)** **Question 13:** **Which one of the following about 5G network slicing is incorrect?** A. Independent service operation **B. Doubled energy efficiency (Correct answer)** C. Guaranteed SLA D. Security isolation **Question 14:** **Which one of the following about the Cloud XR is incorrect?** A. Cloud VR uses cloud rendering. B. Video VR requires high bandwidth. **C. Cloud VR terminals use complex technologies and are costly (Correct answer)** D. CG VR requires low latency. **Question 15:** **Which one of the following 3GPP releases defines NR-V2X for the first time?** A. R14 B. R15 **C. R16 (Correct answer)** D. R17 **Question 16:** **Which one of the following about the MEC benefits is incorrect?** A. MEC can reduce service latency. B. MEC can improve data security and privacy. **C. MEC increases network load (Correct answer)** D. MEC can move data computing and storage from the core to the edge. **Question 17:** **Which one of the following is not a big data technology?** A. Data collection and preprocessing B. Data storage and management C. Data processing and analysis **D. Data forwarding (Correct answer)** **Question 18:** **Which one of the following about the C-V2X is incorrect?** **A. C-V2X is an IEEE-based communications technology for the internet of vehicles (IoV) (Correct answer)** B. C-V2X includes LTE-V2X. C. C-V2X includes LTE-eV2X. D. C-V2X includes NR-V2X. **Question 19:** **Which one of the following modulation schemes is added to the uplink in 3GPP Release 15 compared with LTE?** A. 64QAM B. 128QAM **C. 256QAM (Correct answer)** D. 1024QAM **Question 20:** **Which one of the following about the 5G co-construction and sharing is incorrect?** **A. Operators share the core network (Correct answer)** B. Operators share the base station. C. Operators share the transport network. D. The indoor distribution system is constructed in key indoor distribution scenarios. **Question 21:** **To implement the local application of MEC, which one of the following is not the usual choice for MEC platform deployment?** A. Enterprise campus DC B. Base station equipment room C. Edge DC **D. Core DC (Correct answer)** **Question 22:** **Which one of the following NGC network functions implements authentication management?** A. AMF **B. AUSF (Correct answer)** C. UDM D. SMF **Question 23:** **Which one of the following frequency ranges does sub-3 GHz belong to?** A. VHF **B. UHF (Correct answer)** C. SHF D. EHF **Question 24:** **Which one of the following technologies can be used to improve the spectrum utilization of F-OFDM?** **A. Filter optimization (Correct answer)** B. Carrier bandwidth expansion C. Subcarrier spacing expansion D. TTI shortening **Question 25:** **Which one of the following is correct about the current industrial Internet communication solution?** A. The Bluetooth deployment cost is high. B. The deployment cost of the dedicated industrial wireless communication is low. **C. The Wi-Fi communication technology has security risks and interference. (Correct answer)** D. The 4G cellular network supports massive connections and low latency. **Question 26:** **Which one of the following technologies is first defined in 3GPP Release 15?** A. LTE-V2X B. NR-V2X C. mMTC **D. SA (Correct answer)** **Question 27:** **Which one of the following about the RSU is incorrect?** A. The RSU supports road information broadcast and extends IoV services. B. The RSU communicates with the network through the Uu interface. C. The RSU communicates with vehicles through the PC5 interface. **D. The communication between the RSU and vehicles belongs to the V2N scenario. (Correct answer)** **Question 28:** **Which one of the following about machine learning is correct?** A. A large number of computer hardware resources are required. B. It is suitable for training with a large amount of data. C. The machine automatically selects features. **D. Features are easy to interpret. (Correct answer)** **Question 29:** **Which one of the following scenarios is not suitable for deep learning application?** A. Computer vision B. Natural language processing **C. Charging system (Correct answer)** D. Speech recognition **Question 30:** **Which one of the following about the massive MIMO is incorrect?** A. Massive MIMO is more suitable for high frequency bands. **B. Massive MIMO is more suitable for FDD. (Correct answer)** C. Massive MIMO can reduce interference. D. Massive MIMO can increase cell capacities.