cwnp CWISA-103 Exam Questions

Questions for the CWISA-103 were updated on : Nov 21 ,2025

Page 1 out of 5. Viewing questions 1-15 out of 67

Question 1

What user authentication method is commonly used in guest Wi-Fi networks in the hospitality
industry?

  • A. NTLM
  • B. Captive portal
  • C. Kerberos
  • D. SIM cards
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Captive Portals for Guest Access: These are web pages that intercept users' requests before granting
full internet access. They often require agreeing to terms, entering basic information, or viewing ads.
Hospitality Fit: Captive portals are simple to deploy, require minimal user setup, and provide control
for the hospitality provider (e.g., usage limits).
Why Other Options Are Less Common:
NTLM: Microsoft authentication, mainly for corporate networks, too complex for casual guest use.
Kerberos: Complex authentication for enterprise, overkill for guest Wi-Fi
SIM Cards: Used in cellular devices, not for general Wi-Fi access.
Reference:
Captive Portals: Explanations of how they work and their use cases.
Guest Wi-Fi in Hospitality: Best practices highlight the prevalence of captive portals in this industry.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

What is the primary difference between LoRa and LoRaWAN

  • A. LoRa uses RF and LoRaWAN uses light-based communications
  • B. LoRa is the modulation method (using CSS modulation at the Physical Layer) and LoRaWAN is the MAC sub-layer of the Data Link layer
  • C. LoRa is the Physical Layer and LoRaWAN is the Transport Layer
  • D. LoRa is used for communicating across the Internet and LoRaWAN is used only on the local link
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
LoRa: This refers to the underlying radio modulation technique using Chirp Spread Spectrum (CSS). It
defines how data is physically encoded onto the wireless signal.
LoRaWAN: This is the network protocol built on top of LoRa. It manages device communication,
network topology, and aspects like security. It operates at the MAC sublayer of the Data Link layer
(Layer 2) of the OSI model
LoRa vs. LoRaWAN: Key takeaway is that LoRa is the physical layer technology, while LoRaWAN adds
the networking layer for management.
Reference:
LoRa Modulation: Technical explanations of Chirp Spread Spectrum (CSS).
LoRaWAN Specification: Official documentation detailing the network architecture and MAC layer
functions.
OSI Model: Descriptions of the Data Link layer and its role in networking.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

As an RF signal propagates it becomes weaker as it gets farther away from the transmitter. What
concept is described?

  • A. Free Space Path Loss
  • B. RF latency
  • C. Beamwidth
  • D. Diffraction
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The concept described is Free Space Path Loss (FSPL). FSPL refers to the reduction in power density of
an electromagnetic wave as it propagates through a clear, unobstructed path in free space. This
weakening of the signal is due to the spreading of the wavefront as it travels, causing the power to
be distributed over a larger area. The FSPL can be calculated using the Friis Transmission Equation,
which shows that the received power decreases with the square of the distance from the transmitter.
This concept is fundamental to understanding the behavior of RF signals in various communication
systems, including wireless IoT, where the signal strength at the receiver is a critical factor for reliable
data transmission.
Reference:
The information provided aligns with the Friis Transmission Equation, which models how the power
of an RF signal decreases with distance1
.
Additionally, the concept of FSPL is a well-known
phenomenon in RF propagation, affecting the design and optimization of wireless communication
systems

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

What consideration is found in PtMP systems that is not found in PtP systems?

  • A. Interference avoidance
  • B. SINR optimization
  • C. Airtime management
  • D. Frequency selection
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
PtMP (Point-to-Multipoint): A single access point (AP) communicates with multiple client devices.
This means the AP needs to manage how the available airtime is shared among those clients.
Airtime Fairness: Mechanisms are needed to ensure that:
Each client gets a fair chance to communicate
High-priority traffic isn't starved by low-priority traffic
PtP (Point-to-Point): A dedicated link only has two devices, eliminating the need for complex airtime
management.
Considerations in Both: While interference, SINR, and frequency selection are important in both
PtMP and PtP systems, the need for airtime management is unique to the multipoint scenario.
Reference:
Wireless Network Topologies (PtP vs. PtMP): Explanations of the differences in how communication
is managed in each scenario.
TDMA (Time Division Multiple Access): A common airtime sharing method used in PtMP systems.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What factor severely limits the range of systems operating in the 60GHz band?

  • A. Atmospheric Scattering
  • B. Solar Radiation
  • C. Rain Fade
  • D. Oxygen Fade
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
60GHz Absorption: The 60GHz band experiences significant signal attenuation due to absorption by
oxygen molecules in the atmosphere. This severely restricts the usable range of wireless systems
operating in this frequency.
Why Other Options Don't Apply:
Atmospheric Scattering: Impacts longer wavelength transmissions, less significant at 60GHz.
Solar Radiation: Can cause interference on some frequencies, but not a primary range limitation at
60GHz.
Rain Fade: Primarily affects higher frequencies (above 10GHz), but its impact is less severe than
oxygen absorption at 60GHz.
Reference:
60GHz Propagation Characteristics: Technical papers discussing oxygen absorption and its influence
on range limitations.
Millimeter-wave (mmWave) Communication: Overviews highlighting the challenges and short-range
applications of 60GHz systems.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which one of the following is NOT a typical Smart City application?

  • A. City-wide municipal Wi-Fi
  • B. Pollution monitoring
  • C. Demand-based road tolling
  • D. Self-driving ride sharing
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Smart City Focus: Smart city initiatives mainly address infrastructure, environmental monitoring, and
optimization of public services.
Ride-sharing Context: While self-driving technology could contribute to future smart city
transportation, it's primarily a private-sector innovation, not a core municipal service like the other
options.
Typical Smart City Applications:
Wi-Fi: Provides public internet access, enabling data collection
Pollution Monitoring: Tracks air/water quality for environmental management.
Demand-based Tolling: Adjusts pricing for traffic management.
Reference:
Smart City Examples: Case studies showcasing common application areas (infrastructure,
environment, utilities).
Autonomous Vehicles and Smart Cities: Discussions of the potential interplay but emphasize the still-
developing nature of self-driving tech.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What is the role of the ITU in wireless communications?

  • A. Defines international communications standards
  • B. Oversees communications regulatory agencies in each country
  • C. Coordinates the shared global use of the radio spectrum
  • D. Establishes wireless radiation exposure limits
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
ITU's Mandate: The International Telecommunication Union (ITU) is a specialized agency of the
United Nations focused on global information and communication technologies (ICTs).
Radio Spectrum Regulation: A core ITU function is allocating radio spectrum bands and satellite
orbits to prevent harmful interference between different countries and technologies. This
coordination is essential for the orderly use of wireless communications worldwide.
Other ITU Roles: While involved in standard-setting and establishing best practices, options A and D
are less precise than the ITU's spectrum coordination focus.
Reference:
ITU Website: (
https://www.itu.int/en/
) Outlines its activities and governance of radio spectrum.
ITU Radio Regulations: The international treaty governing the use of the radio-frequency spectrum.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Within what development environment is XAML most commonly used?

  • A. .NET
  • B. Python
  • C. R
  • D. PHP
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
XAML and .NET: XAML (eXtensible Application Markup Language) is primarily used within the .NET
framework for defining user interfaces. Specifically, technologies like:
WPF (Windows Presentation Foundation): Desktop application UIs
Xamarin: Mobile app UIs
XAML in Other Frameworks: While some limited adaptation exists, its core use is tightly coupled with
.NET technologies.
Reference:
XAML Overview (Microsoft Docs): Introductions to XAML emphasizing its use in .NET applications.
WPF Documentation: Tutorials and references specifically mentioning XAML's role in Windows
desktop development.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What is an advantage of using HTTP-based processing?

  • A. It is more secure than other transports, when using SSH
  • B. It is faster than any other APIs
  • C. It is simple and commonly understood in the developer community
  • D. It Is more secure than any other APIs
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
HTTP's Popularity: HTTP is the foundation of the web, making it widely known and supported.
Developers have extensive familiarity with its concepts (methods, headers, status codes, etc.).
REST APIs and Webhooks: These often leverage HTTP for communication, building upon existing
knowledge and tools.
Tradeoffs:
Security: HTTP itself is not inherently secure; HTTPS or additional layers address this.
Speed: Protocols optimized for IoT may have lower overhead, but HTTP's simplicity often outweighs
minor performance differences.
Reference:
REST APIs: Overviews of their use of HTTP, demonstrating its prevalence in API development.
Developer Experience with HTTP: Discussions on the familiarity with and availability of HTTP libraries
in various programming languages

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What is a fundamental structural feature of JSON? (Choose the single best answer.)

  • A. It is a plaintext data structure that consists of free-form Key:Value pairs
  • B. It is an encrypted data structure optimized for secure applications
  • C. It is a data structure stored in MySQL databases for configuration management
  • D. It Is a compressed data structure optimized for low bandwidth applications
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
JSON Fundamentals: JSON (JavaScript Object Notation) is a text-based format for representing data in
a structured, yet flexible way. Its key features are:
Key-Value Pairs: Information is organized as "key":"value" pairs, making it human-readable.
Plaintext: JSON is not encrypted, ensuring easy parsing across different systems.
JSON vs. Other Options
Not Encrypted: Security must be handled at a higher layer if needed.
Not Optimized for Databases: While JSON can be stored in databases, it's designed for data
exchange, not database structure.
Not Inherently Compressed: Compression can be used with JSON, but it's not a core feature.
Reference:
JSON Introduction: Clear definitions and examples of its syntax. (e.g.,
https://www.json.org/json-en.html
)
JSON Data Structures: Explanations of how arrays and nested objects are handled within JSON.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

What is an important feature of the PHP scripting language?

  • A. It only works on Linux systems
  • B. It only works embedded in web applications
  • C. It only works from the command line
  • D. It works in web applications and at the command line
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
PHP's Cross-Platform Nature: PHP originated for server-side web development, but also has a
command-line interface (CLI) enabling its use for scripts and automation tasks.
Other Options:
Some languages are OS-specific (but less frequent with modern scripting languages) .
Many languages work in web or command line, not both like PHP.
Reference:
PHP (Introduction): Overviews mentioning its dual role in server-side web applications and as a
general-purpose scripting language.
PHP CLI: Documentation on the command-line interface for PHP.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

What scripting language works natively inside of nearly all modern Web browsers and may also be
used for automation within some wireless solutions, such as Node-RED?

  • A. PHP
  • B. Python
  • C. JavaScript
  • D. R
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Browser Ubiquity: JavaScript has a native runtime environment within almost every modern web
browser, making it the 'built-in' scripting language for web-based interfaces.
Node-RED: This IoT flow-based programming tool specifically uses JavaScript for its logic and
automation functions.
Other Languages:
PHP: Primarily server-side for web applications
Python: Versatile language, used in some back-end IoT functions but not natively in browsers
R: Statistical and data analysis, not typically embedded in wireless solutions
Reference:
JavaScript (Browser Compatibility): Documentation of its near-universal support
Node-RED (Programming Model): Descriptions of how it uses JavaScript for node logic.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Among these choices, what is the most common reason administrators use scripting during the
deployment of a wireless solution?

  • A. To provide time for playing solitaire
  • B. To reduce configuration errors
  • C. To increase the signal strength of the resulting wireless links
  • D. To enhance the capabilities of the resulting solution
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Automation for Consistency: Scripts eliminate the potential for human error during repetitive
configuration tasks on multiple devices. This ensures uniformity across the wireless solution.
Speed and Efficiency: Scripts can be much faster than manual configuration, particularly in large
deployments.
Other Benefits: While scripts might aid signal strength (e.g., optimizing settings) or enhance solution
capabilities, their core value in configuration is reducing errors.
Reference:
Network Automation: Benefits of using scripts for configuration management.
Configuration Management Best Practices: Emphasize the importance of consistency and
repeatability.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

In a wireless link, as the signal strength decreases, what else may decrease?

  • A. Noise
  • B. Interference
  • C. Latency
  • D. Transmission speeds
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Signal Strength and Data Rate: In wireless links, weaker signal strength often directly correlates to
reduced transmission speeds. Modern wireless technologies use adaptive modulation and coding,
sacrificing speed for reliability when signals become weaker.
Noise and Interference: While these can impact performance, they don't inherently decrease simply
because signal strength drops.
Latency: Latency can be affected by poor signal, but its primary drivers are distance and network
congestion.
Reference:
Wireless Signal Strength vs. Speed: Articles explaining the relationship and how adaptive modulation
works.
Modulation and Coding Schemes (MCS): Technical descriptions of how Wi-Fi and other wireless
technologies adjust speeds based on signal quality.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

You must ensure proper security controls are in place for a wireless solution. The solution allows for
the use of groups to grant access to resources and capabilities. What is the term used to describe a
situation where an individual is granted more access than required because of inclusion in a group?

  • A. Improper delegation
  • B. Privilege escalation
  • C. Privilege creep
  • D. Improper grouping
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Privilege Creep Defined: Gradual accumulation of excessive permissions over time, often due to
users changing roles or access needs not being adjusted accordingly.
Other Terms:
Privilege Escalation: A malicious act of obtaining higher-than-authorized access.
Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.
Reference:
Principle of Least Privilege: Security best practice emphasizing the need to minimize access to only
what's necessary.
Access Control Models: Discussions of how privilege creep can violate security principles.

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2