0% found this document useful (0 votes)
167 views9 pages

ENM 18 Operations For RAN - Test

This document provides a test to evaluate understanding of operations for Ericsson Network Manager 18, which is a tool used to manage radio access networks. It contains 20 multiple choice questions testing knowledge of ENM applications like Alarm Monitor, Network Explorer, and Topology Browser and their usage for tasks like viewing alarms, configuring network elements, and managing keys performance indicators. Test takers are to mark their answers for each question on the provided answer form and submit it for scoring.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views9 pages

ENM 18 Operations For RAN - Test

This document provides a test to evaluate understanding of operations for Ericsson Network Manager 18, which is a tool used to manage radio access networks. It contains 20 multiple choice questions testing knowledge of ENM applications like Alarm Monitor, Network Explorer, and Topology Browser and their usage for tasks like viewing alarms, configuring network elements, and managing keys performance indicators. Test takers are to mark their answers for each question on the provided answer form and submit it for scoring.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ENM 18 Operations for Radio Access

Network

Test

03816-LZU1082671 Rev A
ENM 18 Operations for Radio Access Network

Intentionally Blank

-2 - © Ericsson AB 2018 03816-LZU1082671 Rev A


ENM 18 Operations for Radio Access Network

Mark your answers in the test answer form.

1 The ENM cmedit command set can be used to list node alarms?

a. True

b. False

2 AMOS can be launched from which of the following ENM


applications?

a. Software Hardware Manager

b. Network Explorer, Topology Browser, Alarm Monitor

c. Alarm Monitor, Alarm Search

d. Network Explorer, Alarm Search, Alarm Monitor

3 Using ENM, network element hardware can be


locked/unlocked using:

a. Software Hardware Management

b. AMOS, ENM CLI, Cabinet Viewer

c. Network Health Monitor

d. PMIC

4 What does the Alarm “Hearbeat Failure” in ENM indicate?

a. A connectivity issue between the node and another node

b. A connectivity issue between the node and the core

c. A connectivity issue between the node and the ENM


system

d. A Connectivity issue between the node and the RNC

03816-LZU1082671 Rev A © Ericsson AB 2018 -3 -


ENM 18 Operations for Radio Access Network

5 Which alarms are displayed in the Alarm Monitor Application?

a. Open alarms

b. History alarms

c. Acknowledged/Cleared alarms

d. None of the above

6 Which of the following tools can be used when configuring an


eNodeB from ENM)?

a. Element Manager

b. ENM-CLI

c. Network Explorer

d. All of above

7 With which ENM application can schedule the installation of


licenses and software?

a. Network Explorer

b. PMIC

c. SHM

d. Cabinet viewer

8 In the Alarm Monitor alarm list, why are some alarms in bold
and others are not?

a. They are critical alarms

b. They are unacknowledged alarms

c. They are open alarms

d. They are historical alarms

-4 - © Ericsson AB 2018 03816-LZU1082671 Rev A


ENM 18 Operations for Radio Access Network

9 In ENM, a collection is fixed set of network objects

a. True

b. False

10 Which application in ENM display the calculated values of the


KPIs

a. KPI Management

b. PMIC

c. Network Health Monitor

d. Alarm Overview

11 KPIs in ENM are only created by Ericsson

a. True

b. False

12 Which applications in ENM can be used to list all locked cells


in the network?

a. Alarm Monitor

b. PMIC

c. Network Explorer and ENM CLI

d. Topology Browser

13 What application can be use initiate Alarm Synchronization


between a node and ENM?

a. Alarm Overview

b. Alarm Monitor

c. Network Health Monitor

03816-LZU1082671 Rev A © Ericsson AB 2018 -5 -


ENM 18 Operations for Radio Access Network

d. PMIC

14 KPI thresholds can be changed in Network Health Monitor?

a. True

b. False

15 Which ENM Application can be used to create a collection and


saved search?

a. Network Explorer

b. Topology Browser

c. KPI Management

d. Automatic Id Management

16 Managed Objects attributes can be viewed and changed by


which ENM graphic application?

a. Network Explorer

b. Topology Browser

c. KPI Management

d. Network Explorer and Topology Browser

17 The Alarm Overview application provides:

a. Alarm Sync Status

b. Alarm Statistical data

c. Alarm details

d. Alarm history

-6 - © Ericsson AB 2018 03816-LZU1082671 Rev A


ENM 18 Operations for Radio Access Network

18 Alarms Supervision can be enabled from:

a. Alarm Overview

b. Network Health Monitor

c. Network Explorer

d. Alarm Supervision Status

19 ENM CLI uses the same commands as AMOS.

a. True

b. False

20 What graphical application in ENM allows the user to list


Network Element hardware details (Revision info, product
name, serial number)

a. Topology Browser

b. PMIC

c. Network Explorer

d. SHM

03816-LZU1082671 Rev A © Ericsson AB 2018 -7 -


ENM 18 Operations for Radio Access Network

Intentionally Blank

-8 - © Ericsson AB 2018 03816-LZU1082671 Rev A


ENM 18 Operations for Radio Access Network

Post Test Answer Form


Course Name: ENM 18 Operations for Radio Access Network,
LZU1082671

Name: ____________________________

Date: ______________________

Instructions:

Cross (x) the box corresponding to the most correct answer. Leave
the square blank if you do not know an answer. Note that some
questions may ask for the not correct answer.

1 2 3 4 5 6 7 8 9 10
A
B
C
D

11 12 13 14 15 16 17 18 19 20
A
B
C
D

Result: _______ / 20

03816-LZU1082671 Rev A © Ericsson AB 2018 -9 -

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy