Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Nokia NCM_20002021610 Dumps

NCSS SDM ONE NDS OaM-TSH-16.0 Questions and Answers

Question 1

How to the value for the counter actualFreeMemory calculated?

Options:

A.

Based on both the available free memory and the reclaimable memory

B.

Based on the available free memory

C.

Based on the reclaimable memory

D.

Based on both the available free memory and swap memory

Question 2

Which of the following is the best way to identify the active ADM in a network?

Options:

A.

All the ADM are active in a network.

B.

By running the command /opt/dbm/jboss/bin/is_active.sh as dbmrun user on any ADM.

C.

By running the command “/etc/init.d/jboss active”.

D.

There is no way to identify it from the system. The customer has to know based on history of events done in his network.

Question 3

How to determine at which Soap End point the trigger has failed?

Options:

A.

By looking at notifs.log.

B.

By checking soap logs at BDS and comparing with Application FE.

C.

By checking failed attempt delivery logs.

D.

By checking dead letter logs.

Question 4

Which of the following is true with respect to LDAP clients in OneNDS?

Options:

A.

LDAP clients list is a while list of all the clients that can have an LDAP connection to the OneNDS. It is administered via ADM GUI.

B.

There are two separate lists: white list and black list of LDAP clients. Both these lists can be administered via ADM GUI.

C.

There is no concept of white/black list LDAP clients in OneNDS, anyone can connect and retrieve the data stored.

D.

LDAP clients are white list and are added at the installation time via TPO.

Question 5

Which of the following is NOT a way application reset can triggered via ADM GUI?

Options:

A.

DSA Selection Mode (start reset with data search in directory)

B.

Number Selection Mode (start immediate reset with manually provided VLR/SGSN/MME data)

C.

Profile Management (start or schedule reset based on existing reset profile, created earlier at some stage)

D.

Subscriber selection mode (start reset to a set of subscribers via a text file)

Question 6

How to retrieve logs of different nodes from the ADM?

Options:

A.

Not possible via ADM GUI. Logs of each node have to be collected separately by logging into that node.

B.

Using ‘Log management – Log File Overview’ section of ADM GUI.

C.

Using collect_symptoms

D.

Using collect_logs.sh script.

Question 7

Where are the mass modification logs/results written?

Options:

A.

/opt/provgw/tomcat/logs/instanceX

B.

/srv/sftp/smc-sftp-DEFAULT/outbox/, where “DEFAULT” is the tenant name

C.

/srv/sftp/smc-sftp/outbox

D.

Only available in the provisioning client result file.

Question 8

In a network, say there are 5 PGW. Which of the following statements is correct with respect to bulk request executions?

Options:

A.

Bulk request can be executed on any of the PGW.

B.

Bulk request can only be executed on 1 PWG identified as master PGW & the master PGW is selected via TPD during installation.

C.

Bulk request can only be executed on 1 PGW identified as master PGW & the master PGW can be switched to any of 5 PGW via a configuration change.

D.

The request can be submitted to any of the PGW and it internally forwards to the Master PGW.

Question 9

What is the main purpose of introducing the feature “secure representation of AUC”?

Options:

A.

Obfuscation of encryption key in PWG logs.

B.

Double encryption of AUC key.

C.

Avoid duplication of AUC key during SIM creation.

D.

Encrypting the KI with storage key.