Questions for the CWISA-103 were updated on : Nov 21 ,2025
What user authentication method is commonly used in guest Wi-Fi networks in the hospitality
industry?
B
Explanation:
Captive Portals for Guest Access: These are web pages that intercept users' requests before granting
full internet access. They often require agreeing to terms, entering basic information, or viewing ads.
Hospitality Fit: Captive portals are simple to deploy, require minimal user setup, and provide control
for the hospitality provider (e.g., usage limits).
Why Other Options Are Less Common:
NTLM: Microsoft authentication, mainly for corporate networks, too complex for casual guest use.
Kerberos: Complex authentication for enterprise, overkill for guest Wi-Fi
SIM Cards: Used in cellular devices, not for general Wi-Fi access.
Reference:
Captive Portals: Explanations of how they work and their use cases.
Guest Wi-Fi in Hospitality: Best practices highlight the prevalence of captive portals in this industry.
What is the primary difference between LoRa and LoRaWAN
B
Explanation:
LoRa: This refers to the underlying radio modulation technique using Chirp Spread Spectrum (CSS). It
defines how data is physically encoded onto the wireless signal.
LoRaWAN: This is the network protocol built on top of LoRa. It manages device communication,
network topology, and aspects like security. It operates at the MAC sublayer of the Data Link layer
(Layer 2) of the OSI model
LoRa vs. LoRaWAN: Key takeaway is that LoRa is the physical layer technology, while LoRaWAN adds
the networking layer for management.
Reference:
LoRa Modulation: Technical explanations of Chirp Spread Spectrum (CSS).
LoRaWAN Specification: Official documentation detailing the network architecture and MAC layer
functions.
OSI Model: Descriptions of the Data Link layer and its role in networking.
As an RF signal propagates it becomes weaker as it gets farther away from the transmitter. What
concept is described?
A
Explanation:
The concept described is Free Space Path Loss (FSPL). FSPL refers to the reduction in power density of
an electromagnetic wave as it propagates through a clear, unobstructed path in free space. This
weakening of the signal is due to the spreading of the wavefront as it travels, causing the power to
be distributed over a larger area. The FSPL can be calculated using the Friis Transmission Equation,
which shows that the received power decreases with the square of the distance from the transmitter.
This concept is fundamental to understanding the behavior of RF signals in various communication
systems, including wireless IoT, where the signal strength at the receiver is a critical factor for reliable
data transmission.
Reference:
The information provided aligns with the Friis Transmission Equation, which models how the power
of an RF signal decreases with distance1
.
Additionally, the concept of FSPL is a well-known
phenomenon in RF propagation, affecting the design and optimization of wireless communication
systems
What consideration is found in PtMP systems that is not found in PtP systems?
C
Explanation:
PtMP (Point-to-Multipoint): A single access point (AP) communicates with multiple client devices.
This means the AP needs to manage how the available airtime is shared among those clients.
Airtime Fairness: Mechanisms are needed to ensure that:
Each client gets a fair chance to communicate
High-priority traffic isn't starved by low-priority traffic
PtP (Point-to-Point): A dedicated link only has two devices, eliminating the need for complex airtime
management.
Considerations in Both: While interference, SINR, and frequency selection are important in both
PtMP and PtP systems, the need for airtime management is unique to the multipoint scenario.
Reference:
Wireless Network Topologies (PtP vs. PtMP): Explanations of the differences in how communication
is managed in each scenario.
TDMA (Time Division Multiple Access): A common airtime sharing method used in PtMP systems.
What factor severely limits the range of systems operating in the 60GHz band?
D
Explanation:
60GHz Absorption: The 60GHz band experiences significant signal attenuation due to absorption by
oxygen molecules in the atmosphere. This severely restricts the usable range of wireless systems
operating in this frequency.
Why Other Options Don't Apply:
Atmospheric Scattering: Impacts longer wavelength transmissions, less significant at 60GHz.
Solar Radiation: Can cause interference on some frequencies, but not a primary range limitation at
60GHz.
Rain Fade: Primarily affects higher frequencies (above 10GHz), but its impact is less severe than
oxygen absorption at 60GHz.
Reference:
60GHz Propagation Characteristics: Technical papers discussing oxygen absorption and its influence
on range limitations.
Millimeter-wave (mmWave) Communication: Overviews highlighting the challenges and short-range
applications of 60GHz systems.
Which one of the following is NOT a typical Smart City application?
D
Explanation:
Smart City Focus: Smart city initiatives mainly address infrastructure, environmental monitoring, and
optimization of public services.
Ride-sharing Context: While self-driving technology could contribute to future smart city
transportation, it's primarily a private-sector innovation, not a core municipal service like the other
options.
Typical Smart City Applications:
Wi-Fi: Provides public internet access, enabling data collection
Pollution Monitoring: Tracks air/water quality for environmental management.
Demand-based Tolling: Adjusts pricing for traffic management.
Reference:
Smart City Examples: Case studies showcasing common application areas (infrastructure,
environment, utilities).
Autonomous Vehicles and Smart Cities: Discussions of the potential interplay but emphasize the still-
developing nature of self-driving tech.
What is the role of the ITU in wireless communications?
C
Explanation:
ITU's Mandate: The International Telecommunication Union (ITU) is a specialized agency of the
United Nations focused on global information and communication technologies (ICTs).
Radio Spectrum Regulation: A core ITU function is allocating radio spectrum bands and satellite
orbits to prevent harmful interference between different countries and technologies. This
coordination is essential for the orderly use of wireless communications worldwide.
Other ITU Roles: While involved in standard-setting and establishing best practices, options A and D
are less precise than the ITU's spectrum coordination focus.
Reference:
ITU Website: (
https://www.itu.int/en/
) Outlines its activities and governance of radio spectrum.
ITU Radio Regulations: The international treaty governing the use of the radio-frequency spectrum.
Within what development environment is XAML most commonly used?
A
Explanation:
XAML and .NET: XAML (eXtensible Application Markup Language) is primarily used within the .NET
framework for defining user interfaces. Specifically, technologies like:
WPF (Windows Presentation Foundation): Desktop application UIs
Xamarin: Mobile app UIs
XAML in Other Frameworks: While some limited adaptation exists, its core use is tightly coupled with
.NET technologies.
Reference:
XAML Overview (Microsoft Docs): Introductions to XAML emphasizing its use in .NET applications.
WPF Documentation: Tutorials and references specifically mentioning XAML's role in Windows
desktop development.
What is an advantage of using HTTP-based processing?
C
Explanation:
HTTP's Popularity: HTTP is the foundation of the web, making it widely known and supported.
Developers have extensive familiarity with its concepts (methods, headers, status codes, etc.).
REST APIs and Webhooks: These often leverage HTTP for communication, building upon existing
knowledge and tools.
Tradeoffs:
Security: HTTP itself is not inherently secure; HTTPS or additional layers address this.
Speed: Protocols optimized for IoT may have lower overhead, but HTTP's simplicity often outweighs
minor performance differences.
Reference:
REST APIs: Overviews of their use of HTTP, demonstrating its prevalence in API development.
Developer Experience with HTTP: Discussions on the familiarity with and availability of HTTP libraries
in various programming languages
What is a fundamental structural feature of JSON? (Choose the single best answer.)
A
Explanation:
JSON Fundamentals: JSON (JavaScript Object Notation) is a text-based format for representing data in
a structured, yet flexible way. Its key features are:
Key-Value Pairs: Information is organized as "key":"value" pairs, making it human-readable.
Plaintext: JSON is not encrypted, ensuring easy parsing across different systems.
JSON vs. Other Options
Not Encrypted: Security must be handled at a higher layer if needed.
Not Optimized for Databases: While JSON can be stored in databases, it's designed for data
exchange, not database structure.
Not Inherently Compressed: Compression can be used with JSON, but it's not a core feature.
Reference:
JSON Introduction: Clear definitions and examples of its syntax. (e.g.,
https://www.json.org/json-en.html
)
JSON Data Structures: Explanations of how arrays and nested objects are handled within JSON.
What is an important feature of the PHP scripting language?
D
Explanation:
PHP's Cross-Platform Nature: PHP originated for server-side web development, but also has a
command-line interface (CLI) enabling its use for scripts and automation tasks.
Other Options:
Some languages are OS-specific (but less frequent with modern scripting languages) .
Many languages work in web or command line, not both like PHP.
Reference:
PHP (Introduction): Overviews mentioning its dual role in server-side web applications and as a
general-purpose scripting language.
PHP CLI: Documentation on the command-line interface for PHP.
What scripting language works natively inside of nearly all modern Web browsers and may also be
used for automation within some wireless solutions, such as Node-RED?
C
Explanation:
Browser Ubiquity: JavaScript has a native runtime environment within almost every modern web
browser, making it the 'built-in' scripting language for web-based interfaces.
Node-RED: This IoT flow-based programming tool specifically uses JavaScript for its logic and
automation functions.
Other Languages:
PHP: Primarily server-side for web applications
Python: Versatile language, used in some back-end IoT functions but not natively in browsers
R: Statistical and data analysis, not typically embedded in wireless solutions
Reference:
JavaScript (Browser Compatibility): Documentation of its near-universal support
Node-RED (Programming Model): Descriptions of how it uses JavaScript for node logic.
Among these choices, what is the most common reason administrators use scripting during the
deployment of a wireless solution?
B
Explanation:
Automation for Consistency: Scripts eliminate the potential for human error during repetitive
configuration tasks on multiple devices. This ensures uniformity across the wireless solution.
Speed and Efficiency: Scripts can be much faster than manual configuration, particularly in large
deployments.
Other Benefits: While scripts might aid signal strength (e.g., optimizing settings) or enhance solution
capabilities, their core value in configuration is reducing errors.
Reference:
Network Automation: Benefits of using scripts for configuration management.
Configuration Management Best Practices: Emphasize the importance of consistency and
repeatability.
In a wireless link, as the signal strength decreases, what else may decrease?
D
Explanation:
Signal Strength and Data Rate: In wireless links, weaker signal strength often directly correlates to
reduced transmission speeds. Modern wireless technologies use adaptive modulation and coding,
sacrificing speed for reliability when signals become weaker.
Noise and Interference: While these can impact performance, they don't inherently decrease simply
because signal strength drops.
Latency: Latency can be affected by poor signal, but its primary drivers are distance and network
congestion.
Reference:
Wireless Signal Strength vs. Speed: Articles explaining the relationship and how adaptive modulation
works.
Modulation and Coding Schemes (MCS): Technical descriptions of how Wi-Fi and other wireless
technologies adjust speeds based on signal quality.
You must ensure proper security controls are in place for a wireless solution. The solution allows for
the use of groups to grant access to resources and capabilities. What is the term used to describe a
situation where an individual is granted more access than required because of inclusion in a group?
C
Explanation:
Privilege Creep Defined: Gradual accumulation of excessive permissions over time, often due to
users changing roles or access needs not being adjusted accordingly.
Other Terms:
Privilege Escalation: A malicious act of obtaining higher-than-authorized access.
Improper Delegation/Grouping: Faulty permission assignment, but not the gradual accretion aspect.
Reference:
Principle of Least Privilege: Security best practice emphasizing the need to minimize access to only
what's necessary.
Access Control Models: Discussions of how privilege creep can violate security principles.