Pass the CWNP CWSA (Solutions Administrator) CWISA-102 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

You are implementing a smart office wireless solution for a small business. The business owner indicates that It is acceptable to use consumer-targeted wireless devices. What is a common negative attribute of consumer-targeted smart home or smart office devices?

Options:

A.

They rarely support features required for small business deployment


B.

They often operate only in the 2.4 GHz frequency band used by 802.11 devices


C.

They typically only support FHSS modulation schemes


D.

They usually stop working after twelve months


Expert Solution
Questions # 12:

What does the number in the various Quadrature Amplitude Modulation levels, such as 16 in QAM-16 and 64 in QAM-64, indicate? (Choose the single best answer.)

Options:

A.

The speed of data transfer,which is four times the number in the QAM level


B.

The channel width, which is stipulated in MHz


C.

The number of target points in the QAM constellation, which are equivalent to amplitude and phase combinations


D.

The number of spatial streams, which is 1/4 the number in the QAM level


Expert Solution
Questions # 13:

What advantage is provided by using an NTP server within a wireless solution architecture?

Options:

A.

It provides for semi-automatic IP addressing in wireless sensor networks


B.

It ensures security through AES encryption


C.

It ensures uniform, synchronized time among devices


D.

It provides for name resolution for older network devices


Expert Solution
Questions # 14:

What statement best describes the difference between authentication and authorization?

Options:

A.

Authentication ensures privacy and authorization ensures availability


B.

Authentication is not used in wireless solutions and authorization is used in wireless solutions


C.

Authentication proves identity and authorization determines access to specific resources


D.

Authentication is used in wireless solutions and authorization is not


Expert Solution
Questions # 15:

What is the role of the ITU in wireless communications?

Options:

A.

Defines international communications standards


B.

Oversees communications regulatory agencies in each country


C.

Coordinates the shared global use of the radio spectrum


D.

Establishes wireless radiation exposure limits


Expert Solution
Questions # 16:

What is the benefit of using SINR as opposed to SNR to reference signal quality at a receiver?

Options:

A.

SINR includes interference as well as the noise floor


B.

SNR excludes the noise floor, which skews the results


C.

SINR excludes interference and only measures the noise floor


D.

SNR includes interference measurements that skew the results


Expert Solution
Questions # 17:

Which one of the following items has driven large serving 5- to 18-year-old students?

Options:

A.

Cloud-based applications


B.

Online torrent sites


C.

Streaming music


D.

Wearable body sensors


Expert Solution
Questions # 18:

What is an advantage of using HTTP-based processing?

Options:

A.

It is more secure than other transports, when using SSH


B.

It is faster than any other APIs


C.

It is simple and commonly understood in the developer community


D.

It Is more secure than any other APIs


Expert Solution
Questions # 19:

Which one of the following location tracking technologies is most energy efficient in typical implementations?

Options:

A.

BLE Beacons


B.

Cellular


C.

GPS


D.

Wi-Fi


Expert Solution
Questions # 20:

Which one of the following is NOT a typical Smart City application?

Options:

A.

City-wide municipal Wi-Fi


B.

Pollution monitoring


C.

Demand-based road tolling


D.

Self-driving ride sharing


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions