CWNP CWISA-102 Certified Wireless IoT Solutions Administrator Exam CWISA Exam Practice Test

Page: 1 / 14
Total 67 questions
Question 1

What user authentication method is commonly used in guest Wi-Fi networks in the hospitality industry?



Answer : B

Captive Portals for Guest Access:These are web pages that intercept users' requests before granting full internet access. They often require agreeing to terms, entering basic information, or viewing ads.

Hospitality Fit:Captive portals are simple to deploy, require minimal user setup, and provide control for the hospitality provider (e.g., usage limits).

Why Other Options Are Less Common:

NTLM:Microsoft authentication, mainly for corporate networks, too complex for casual guest use.

Kerberos:Complex authentication for enterprise, overkill for guest Wi-Fi

SIM Cards:Used in cellular devices, not for general Wi-Fi access.

References:

Captive Portals:References of how they work and their use cases.

Guest Wi-Fi in Hospitality:Best practices highlight the prevalence of captive portals in this industry.


Question 2

You must ensure proper security controls are in place for a wireless solution. The solution allows for the use of groups to grant access to resources and capabilities. What is the term used to describe a situation where an individual is granted more access than required because of inclusion in a group?



Answer : C

Privilege Creep Defined:Gradual accumulation of excessive permissions over time, often due to users changing roles or access needs not being adjusted accordingly.

Other Terms:

Privilege Escalation: A malicious act of obtaining higher-than-authorized access.

Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.

References:

Principle of Least Privilege:Security best practice emphasizing the need to minimize access to only what's necessary.

Access Control Models:Discussions of how privilege creep can violate security principles.


Question 3

What is the most important consideration when deciding whether to implement a wired or wireless solution?



Answer : D

Requirements Drive Decisions:The decision between wired or wireless must align with the solution's overall purpose, performance targets, and operational constraints.

Key Considerations:

Reliability:Does the application require guaranteed connectivity? (Wired may be favored).

Installation Cost:Can extensive cabling be done, or is it prohibitively expensive? (Wireless may be favored).

Flexibility and Scalability:Is node placement likely to change in the future? (Wireless may be favored).

Other Factors are Important, But Secondary:Distance, PoE availability, specific applications all matter, but they are assessedwithin the contextof the overarching business needs.

References:

Wireless vs. Wired Network Design:Comparisons of pros and cons, highlighting how use cases guide the choice.

IoT Solution Planning:Materials on defining requirementsbeforeselecting technology.


Question 4

You are troubleshooting a problem with a wireless solution that uses MQTT where the IoT end devices are not reporting to the MQTT server/broker. At what Layer of the OSI Model should troubleshooting begin when using a bottom-up method?



Answer : A

Bottom-Up Troubleshooting:The OSI model provides a structured diagnostic approach. Starting at Layer 1 ensures basic physical connectivity issues are ruled out first.

MQTT Relies on IP:MQTT operates at a higher layer of the OSI model, relying on TCP/IP (Layers 4 and 3) for communication. Problems at the physical layer will disrupt everything built upon it.

Checking the Fundamentals:Before investigating complex application issues (MQTT), verify cables, link lights, Wi-Fi signal strength, etc.

References:

OSI Model:Descriptions of the seven layers, emphasizing the foundation provided by Layer 1 (Physical).

Network Troubleshooting Guides:Resources that outline common Layer 1 problems and their symptoms.


Question 5

Which one of the following items has driven large serving 5- to 18-year-old students?



Answer : A

Cloud-based applications drive bandwidth usage:Applications like Google Suite, Microsoft 365, and video conferencing (Zoom, Teams) are commonly used in educational settings. These rely on cloud servers, requiring significant downloads and uploads.

Shift towards online learning:More schools are utilizing online learning platforms and resources, further increasing their dependence on cloud-based solutions.

Streaming, torrents, wearables less impactful:Streaming music and torrent sites can contribute, but their impact is generally less significant. Wearables in education are still niche despite their potential.

References

Trends in education technology:Reports on the rise of cloud-based learning platforms in schools.

[Example: Project Tomorrow Speak Up Research Project on Digital Learning] (https://tomorrow.org/speakup/)

Network usage studies in schools:Research on bandwidth usage patterns can confirm the primary drivers of traffic in educational settings.


Question 6

Which one of the following location tracking technologies is most energy efficient in typical implementations?



Answer : A

BLE Beacon Power Efficiency:Bluetooth Low Energy (BLE) beacons are designed for low power consumption.Their primary function is to periodically broadcast short data packets (advertising their presence).

Other Technologies:

Cellular:More power-hungry due to long-range communication and complex protocols.

GPS:Power intensive,especially when actively tracking location.

Wi-Fi:


Question 7

In the simplified three-layer model for wireless IoT, what is the universal primary function of the Perception layer?



Answer : A

Perception Layer:The foundation of an IoT system, it consists of sensors and actuators that:

Sense:Collect data about the environment or object being monitored.

Actuate:Potentially make changes based on commands (e.g., a smart valve opening/closing).

Transmit:Send gathered data to upper layers for processing.


Page:    1 / 14   
Total 67 questions