CWNP Certified Wireless IoT Solutions Administrator Exam CWISA-102 CWISA Exam Questions

Page: 1 / 14
Total 67 questions
Question 1

How does OFDMA differ from OFDM?



Answer : C

OFDM vs. OFDMA:

OFDM (Orthogonal Frequency-Division Multiplexing):Divides a channel into multiple subcarriers for data transmission.

OFDMA (Orthogonal Frequency-Division Multiple Access):Extends OFDM by allowing multiple users to share subcarriers simultaneously, improving efficiency and spectral utilization.

References

OFDM:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing

OFDMA:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiple_access


Question 2

What is a common characteristic of Industrial IoT (IIoT) devices that is not a characteristic of all IoT devices?



Answer : A

IIoT Environments:Industrial IoT (IIoT) often involves deployment in harsh environments (factories, plants, outdoor sites) with:

Extreme temperatures

Dust & Vibrations

Exposure to chemicals or moisture

Ruggedization:IIoT devices are designed to withstand these conditions, ensuring reliability and longevity.

References

IIoT:https://en.wikipedia.org/wiki/Industrial_Internet_of_things

Rugged Devices:Articles on ruggedized electronics will emphasize their importance in industrial settings.


Question 3

A Wi-Fi enabled weight scale is an example of what kind of health IoT device?



Answer : C

Health IoT Device Categories:

Wearable:Devices worn on the body (smartwatches, fitness trackers).

Non-wearable:Devices used without being worn (smart scales, connected medical equipment).

Implantable:Surgically inserted devices (pacemakers, glucose monitors).

References

Health IoT:Resources on healthcare + IoT will illustrate device types.


Question 4

How is ASK modulation different from FSK modulation?



Answer : A

Key Modulation Differences:

ASK (Amplitude Shift Keying):Digital data is represented by changes in the amplitude (strength) of a carrier wave.

FSK (Frequency Shift Keying):Digital data is represented by changes in the frequency of a carrier wave.

References

ASK:https://en.wikipedia.org/wiki/Amplitude-shift_keying

FSK:https://en.wikipedia.org/wiki/Frequency-shift_keying


Question 5

Which one of the following location tracking technologies is most energy efficient in typical implementations?



Answer : A

BLE Beacon Power Efficiency:Bluetooth Low Energy (BLE) beacons are designed for low power consumption.Their primary function is to periodically broadcast short data packets (advertising their presence).

Other Technologies:

Cellular:More power-hungry due to long-range communication and complex protocols.

GPS:Power intensive,especially when actively tracking location.

Wi-Fi:


Question 6

You are implementing a smart office wireless solution for a small business. The business owner indicates that It is acceptable to use consumer-targeted wireless devices. What is a common negative attribute of consumer-targeted smart home or smart office devices?



Answer : B

Consumer Smart Devices Limitation:Many consumer-oriented smart devices are designed for simplicity and cost-effectiveness, leading to reliance on the crowded 2.4 GHz band.

Consequences:

High Interference:Increased potential for interference from Wi-Fi and other 2.4 GHz devices.

Limited scalability:Performance and reliability may degrade in busy wireless environments.


Question 7

You must ensure proper security controls are in place for a wireless solution. The solution allows for the use of groups to grant access to resources and capabilities. What is the term used to describe a situation where an individual is granted more access than required because of inclusion in a group?



Answer : C

Privilege Creep Defined:Gradual accumulation of excessive permissions over time, often due to users changing roles or access needs not being adjusted accordingly.

Other Terms:

Privilege Escalation: A malicious act of obtaining higher-than-authorized access.

Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.

References:

Principle of Least Privilege:Security best practice emphasizing the need to minimize access to only what's necessary.

Access Control Models:Discussions of how privilege creep can violate security principles.


Page:    1 / 14   
Total 67 questions