CWNP Certified Wireless IoT Solutions Administrator (2025 Edition) CWISA-103 Exam Practice Test

Page: 1 / 14
Total 67 questions
Question 1

What kind of PoE device can be used to power a non-PoE connected object assuming PoE power is provided on the Ethernet cable?



Answer : D

PoE Splitter:A PoE splitter separates power and data from a PoE-enabled Ethernet cable, allowing the powering of non-PoE devices.

Other PoE Devices:

PoE Injector:Adds power to non-PoE Ethernet cable.

PoE Switch:Provides power directly through its ports.


Question 2

What function does the IEEE perform in relation to wireless technologies?



Answer : A

IEEE's Role:The Institute of Electrical and Electronics Engineers (IEEE) is a global organization critical in developing and promoting technical standards across various fields, including wireless technologies.

Standards Work:IEEE creates wireless technology standards like:

IEEE 802.11:Wi-Fi standards

IEEE 802.15.4:Basis for ZigBee, Thread, and other low-power networks

Reference

IEEE:https://www.ieee.org/


Question 3

You must plan for encryption in a wireless solution deployment. What type of data should always be encrypted? (Choose the single best answer.)



Answer : A

Most Vulnerable In Transit:Sensitive data (passwords, health information, etc.) is most susceptible to interception while being sent over a wireless network. Encryption is crucial at this stage.

Encryption at Rest and in Memory:While also important, these are often handled with different cryptographic techniques depending on the system.


Wireless Security Protocols:Details on encryption standards like WPA2/WPA3, TLS that focus on protecting data during transmission.

Question 4

How does OFDMA differ from OFDM?



Answer : C

OFDM vs. OFDMA:

OFDM (Orthogonal Frequency-Division Multiplexing):Divides a channel into multiple subcarriers for data transmission.

OFDMA (Orthogonal Frequency-Division Multiple Access):Extends OFDM by allowing multiple users to share subcarriers simultaneously, improving efficiency and spectral utilization.

Reference

OFDM:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing

OFDMA:https://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiple_access


Question 5

What is the role of the ITU in wireless communications?



Answer : C

ITU's Mandate:The International Telecommunication Union (ITU) is a specialized agency of the United Nations focused on global information and communication technologies (ICTs).

Radio Spectrum Regulation:A core ITU function is allocating radio spectrum bands and satellite orbits to prevent harmful interference between different countries and technologies. This coordination is essential for the orderly use of wireless communications worldwide.

Other ITU Roles:While involved in standard-setting and establishing best practices, options A and D are less precise than the ITU's spectrum coordination focus.


ITU Website:(https://www.itu.int/en/) Outlines its activities and governance of radio spectrum.

ITU Radio Regulations:The international treaty governing the use of the radio-frequency spectrum.

Question 6

You are deploying a ZigBee network based on the frequency band available for ZigBee deployment worldwide. What allowable action will do the most to minimize ZigBee and 802.11 interference?



Answer : B

Wi-Fi and Zigbee Interference:Both can operate in the 2.4 GHz band, leading to potential interference that degrades performance for both networks.

5 GHz Advantages:

Less crowded: Fewer devices operate in the 5 GHz band, reducing interference potential.

Wider Channels: 5 GHz supports wider channels, enabling higher data throughput for Wi-Fi.


Question 7

You must ensure proper security controls are in place for a wireless solution. The solution allows for the use of groups to grant access to resources and capabilities. What is the term used to describe a situation where an individual is granted more access than required because of inclusion in a group?



Answer : C

Privilege Creep Defined:Gradual accumulation of excessive permissions over time, often due to users changing roles or access needs not being adjusted accordingly.

Other Terms:

Privilege Escalation: A malicious act of obtaining higher-than-authorized access.

Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.


Principle of Least Privilege:Security best practice emphasizing the need to minimize access to only what's necessary.

Access Control Models:Discussions of how privilege creep can violate security principles.

Page:    1 / 14   
Total 67 questions