Pass the CWNP CWSA (Solutions Administrator) CWISA-102 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are planning a wireless solution. Why should you consider an ongoing monitoring system for use after the solution is deployed?

Options:

A.

Implementation validation is never completed, it continues throughout the life of the system


B.

Monitoring the solution provides additional billable hours


C.

The number of users and the use of the solution will change over time and monitoring allows for detection of these changes


D.

To ensure that the system continues to meet the original requirements, even if users later indicate poor performance


Questions # 2:

What part(s) of the OSI network model does the IETF primarily focus on for the development of standards?

Options:

A.

Physical Layerand above


B.

All layers


C.

Network Layer and above


D.

Data Link Layer


Questions # 3:

Why is it important to adhere to safety and building codes when installing equipment?

Options:

A.

They can be ignored as they are regulations designed for other industries


B.

It is an insurance requirement designed to reduce insurance ratesand reduce Incident reports against Insurance policies


C.

It prevents equipment from falling to the floor and being damaged because of the Impact


D.

It protects the life and health of Installers and end users during installation and after the system Is deployed


Questions # 4:

What function does the IEEE perform in relation to wireless technologies?

Options:

A.

Promotes technology and standards development


B.

Designs wireless chipsets


C.

Certified equipment to be compatible


D.

Brings wireless products to market


Questions # 5:

What is an important feature of the PHP scripting language?

Options:

A.

It only works on Linux systems


B.

It only works embedded in web applications


C.

It only works from the command line


D.

It works in web applications and at the command line


Questions # 6:

You are planning a wireless solution deployment. The organization has several wireless solutions in use. The new deployment must coexist with these other wireless solutions. What is the most important factor to consider when implementing the new wireless solution?

Options:

A.

Coordinating mounting locations with the other wireless solutions


B.

Implementing matching encryption keys synchronized with the other wireless solutions


C.

Implementing contrasting encryption keys countering the other wireless solutions


D.

Coordinating frequency use with the other wireless solutions


Questions # 7:

What user authentication method is commonly used in guest Wi-Fi networks in the hospitality industry?

Options:

A.

NTLM


B.

Captive portal


C.

Kerberos


D.

SIM cards


Questions # 8:

You must plan for encryption in a wireless solution deployment. What type of data should always be encrypted? (Choose the single best answer.)

Options:

A.

Sensitive data in transmission


B.

Sensitive data in memory


C.

Non-sensitive data at rest


D.

Non-sensitive data in archives


Questions # 9:

How does OFDMA differ from OFDM?

Options:

A.

Subcarriers of OFDMA can contain data destined for a different receiver


B.

OFDMA offers greater range by using multiple channels at once


C.

OFDMA allows multiple devices to transmit simultaneously on the same frequency


D.

OFDMA uses multiple radios to achieve higher throughput


Questions # 10:

How is ASK modulation different from FSK modulation?

Options:

A.

ASK varies the amplitude of the signal while FSK shifts its frequency


B.

FSK is more sensitive to noise than ASK


C.

ASK does not work at high frequencies


D.

ASK can carry more data than FSK


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions