Category Archives: CWNP

CWISA-102 Certified Wireless IoT Solutions Administrator Exam

Next scheduled update: CWISA-103 releasing in September 2025

NOTE: For those using the CWSA-101 or CWISA-101 Study and Reference Guides, which are identical in content – only the book title changed to reflect the updated certification name, the current errata is available here.

A solid foundation for the rest of the wireless world. While no certification can cover every single wireless technology in use today, it is important for wireless professionals to grasp the most frequently used wireless solutions in organizations. The Certified Wireless IoT Solutions Administrator (CWISA) learning materials and exam will ensure students know these common wireless certification solutions and prove their knowledge through.

CWISA is built upon two decades of historic quality in WLAN (802.11) certifications and begins the extension of CWNP offerings into the non-802.11 wireless solutions:

Internet of Things (IoT)
Bluetooth Low Energy (BLE)
Cellular Solutions (LTE, LTE-U, 5G, CBRS)
Machine to Machine Communications (M2M)
Zigbee
Location Services
Wired-Side Supporting Technologies
High-Level Awareness of APIs and Automation/Integration Concepts
Project and Program Management Specific to Wireless Solutions Projects

Examkingdom CWNP CWISA-102 Exam pdf,

CWNP CWISA-102 Exam

Best CWNP CWISA-102 Downloads, CWNP CWISA-102 Dumps at Certkingdom.com

CWISA-102 2022 Objectives
If you are familiar with the CWNA certification and learning materials, the CWISA will have the same approximate depth and breadth of learning. In the future, additional certifications will address key areas in greater depth, such as automation/integration, IoT, private 5G, etc.

Knowledge Domain Percentage
Wireless Technologies 15%
Radio Frequency Communications 15%
Planning Wireless Solutions 20%
Implementing Wireless Solutions 25%
Supporting Wireless Solutions 25%

1.0 Wireless Technologies (15%)
1.1 Maintain continued awareness of wireless IoT technologies and applications of those technologies
1.1.1 Understand research and lab testing skills to maintain technology awareness
1.1.2 Understand the most common applications of wireless technologies, the frequencies used and communication protocols
1.2 Understand industry standard, certification and regulatory organizations and standards development processes
1.2.1 Institute of Electrical and Electronics Engineers (IEEE)
1.2.2 Internet Engineering Task Force (IETF)
1.2.3 Wi-Fi Alliance
1.2.4 International Telecommunication Union (ITU)
1.2.5 Bluetooth Special Interest Group (SIG)
1.2.6 3rd Generation Partnership Project (3GPP)
1.2.7 Connectivity Standards Alliance (CSA)
1.2.8 LoRa Alliance
1.2.9 Explain the roles of regulatory agencies such as the FCC, IC, CE and others
1.3 Define wireless network types
1.3.1 Wireless Local Area Network (WLAN)
1.3.2 Wireless Personal Area Network (WPAN)
1.3.3 Wireless Body Area Network (WBAN)
1.3.4 Wireless Metropolitan Area Network (WMAN)
1.3.5 Wireless Wide Area Network (WWAN)
1.3.6 Wireless Sensor Network (WSN)
1.3.7 Internet of Things (IoT)
1.3.7.1 Industry 4.0/5.0
1.3.7.2 Connected Vehicles
1.3.7.3 Smart Cities
1.3.7.4 Smart Offices/Buildings/Homes
1.4 Understand hardware and software components of IoT end devices and gateways
1.4.1 Processors
1.4.2 Memory
1.4.3 Radios
1.4.4 Storage
1.4.5 Sensors
1.4.6 Network connections
1.4.7 Operating Systems/Firmware
1.4.8 Application/Service Software
1.4.9 Off-the-shelf Devices
1.4.10 Custom Devices

2.0 Radio Frequency Communications (15%)

2.1 Explain the basic RF wave characteristics, behaviors and measurements used for wireless communications
2.1.1 Frequency, wavelength, amplitude, and phase
2.1.2 Amplification, attenuation, and free space path loss
2.1.3 Absorption, reflection, refraction, scattering, and diffraction
2.1.4 RF signal metrics
2.1.4.1 Watt, milliwatt, and microwatt
2.1.4.2 Decibel (dB) and decibels to milliwatt (dBm)
2.1.4.3 RF noise and noise floor
2.1.4.4 SNR and SINR
2.2 Describe the fundamentals of modulation techniques used in wireless communications
2.2.1 Amplitude Shift Keying (ASK)
2.2.2 Frequency Shift Keying (FSK)
2.2.3 Phase Shift Keying (PSK)
2.2.4 Amplitude and Phase Shift Keying (APSK)
2.2.5 Quadrature Amplitude Modulation (QAM)
2.2.6 Orthogonal Frequency Division Multiplexing (OFDM)
2.2.7 Orthogonal Frequency Division Multiple Access (OFDMA)
2.2.8 Frequency Hopping
2.2.9 Chirp Spread Spectrum (CSS)
2.2.10 Additional modulation methods (AM, FM, and CW)
2.3 Explain the basic capabilities of components used in RF communications
2.3.1 Radios (receivers, transmitters, and transceivers)
2.3.2 Antennas
2.3.3 Intentional radiator and Equivalent Isotropically Radiated Power (EIRP) and Effective Radiated Power (ERP)
2.3.4 RF cabling and connectors
2.3.5 Link types including PTP, PTMP, mesh, ad-hoc and on-demand
2.4 Describe the basic use and capabilities of the RF bands
2.4.1 Radio Frequency Bands
2.4.2 RF bands and communication ranges
2.4.3 RF bands and power levels

3.0 Planning Wireless Solutions (20%)

3.1 Identify and use the wireless IoT system requirements
3.1.1 Use cases and applications
3.1.2 Capacity requirements
3.1.3 Security and monitoring requirements
3.1.4 Integration requirements (automation, data transfer/conversion, APIs, cross-platform integration)
3.1.5 Stakeholder identification
3.2 Identify and comply with system constraints
3.2.1 Budgetary constraints
3.2.2 Security constraints
3.2.3 Technical constraints
3.2.4 Business policies and requirements
3.2.5 Regulatory constraints
3.2.6 System dependencies
3.2.7 Evaluate existing network infrastructure and understand its limitations in the context of the new wireless system
3.3 Select appropriate wireless IoT solutions based on requirements and constraints
3.4 Plan for the technical requirements of the wireless IoT solution
3.4.1 LAN networking requirements (VLANs, PoE, TCP/IP, DHCP, DNS, wired connectivity, cellular connections, serial data)
3.4.2 WAN networking requirements
3.4.3 Systems requirements (virtualization, containers, cloud platforms, cabling, grounding, radios, antennas)
3.4.4 APIs, protocols, and programmability (RESTful, Webhooks, Web Sockets, OpenConfig, MQTT)
3.4.5 Frequency coordination compliance (channel capacity management, interoperability, interference management)
3.5 Understand the basic features and capabilities of common wireless IoT solutions and plan for their implementation
3.5.1 Internet of Things (IoT) (CO-to-CO, CO-to-Service, CO-to-human)
3.5.2 802.11 WLANs
3.5.3 Bluetooth
3.5.4 Zigbee
3.5.5 802.15.4-based protocols
3.5.6 LoRaWAN
3.5.7 Sigfox
3.5.8 Location services (RTLS, Bluedot, geofencing, beaconing) and location methods, including triangulation, trilateration and multi-lateration

4.0 Implementing Wireless Solutions (25%)

4.1 Understand the wireless IoT solution and consider key issues related to automation, integration, monitoring, and management
4.1.1 Automation, integration, and management protocols and standards (APIs, programming languages, data structures, communication protocols, data of interest, analytics, and services)
4.1.2 Monitoring solutions (integrated, overlay, APIs)
4.2 Use best practices in wireless IoT solution implementations
4.2.1 Pilot testing (proof-of-concept, early-stage analysis)
4.2.2 Configuration and staging
4.2.3 Installation
4.2.4 Documentation
4.3 Validate wireless solution implementations including RF communications and application functionality
4.3.1 Initial testing
4.3.2 Troubleshooting and remediation
4.4 Understand and implement basic installation procedures
4.4.1 Configure and mount wireless equipment according to applicable safety requirements (OSHA) and building codes
4.4.2 Configure connectivity (wireless and wired)
4.4.3 Configure the network infrastructure or communicate configuration requirements to the appropriate individuals
4.4.4 Configure cloud connectivity where appropriate
4.4.5 Configure features related to video, voice, captive portals, container-based apps, telemetry, location services, MDM and SDN/NFV
4.4.6 Implement appropriate security solutions for the selected wireless system
4.4.6.1 Authentication
4.4.6.2 Authorization
4.4.6.3 Encryption
4.4.6.4 Monitoring
4.5 Implement best practices in knowledge transfer and hand-off
4.5.1 Staff training (end users, administrators)
4.5.2 Solution documentation (topology, configuration, protocols, physical locations, APIs in use)
4.5.3 Final customer meeting (requirements review, stakeholder approval)

5.0 Supporting Wireless Solutions (25%)

5.1 Administer the wireless solution while considering the implications of various vertical markets
5.1.1 Healthcare
5.1.2 Industrial/Manufacturing
5.1.3 Smart Cities
5.1.4 Consumer spaces (smart homes)
5.1.5 Smart Agro
5.1.6 Smart Offices/Buildings
5.1.7 Retail
5.1.8 Education
5.1.9 Large Public Venues
5.2 Troubleshoot common problems in wireless IoT solutions
5.2.1 Interference
5.2.2 Improper configuration
5.2.3 Security misconfiguration
5.2.4 Signal strength
5.2.5 Malfunctioning hardware
5.2.6 Software/firmware issues
5.2.7 Drivers
5.2.8 Faulty custom software code
5.2.9 Faulty installation
5.3 Understand and determine the best use of scripting and programming solutions for wireless IoT implementations
5.3.1 Identify and differentiate among the features of various scripting/programming languages (Python, R, PHP, C (and variants), JavaScript, Java and TypeScript)
5.3.2 Understand the basics of data structures commonly used for integration of networked systems
5.3.2.1 JSON
5.3.2.2 YANG
5.3.2.3 XML
5.3.2.4 YAML
5.3.2.5 XAML
5.3.3 Understand the basics of APIs and common models
5.3.3.1 RESTful
5.3.3.2 webhooks
5.3.3.3 WebSockets
5.3.3.4 Standard HTTP GET/POST processing
5.3.4 Understand the basics of networking, application and security protocols used in wireless IoT solutions
5.3.4.1 HTTP/HTTPS
5.3.4.2 NETCONF
5.3.4.3 OpenConfig
5.3.4.4 MQTT, DDS, AMQP, CoAP
5.3.4.5 SNMP
5.3.4.6 SSL/TLS
5.3.4.7 SSH
5.3.4.8 IPv4/IPv6
5.3.4.9 TCP/UDP
5.4 Understand application architectures and their impact on wireless IoT solutions
5.4.1 Single-tier architecture
5.4.2 Multi-tier architecture
5.4.3 Database systems (relational, No-SQL, streaming data)
5.4.4 Web Servers
5.4.5 Application servers/services (Network Time Protocol, DNS, system-specific)


Sample Questions Answers

QUESTION 1
What part(s) of the OSI network model does the IETF primarily focus on for the development of standards?

A. Physical Layerand above
B. All layers
C. Network Layer and above
D. Data Link Layer

Answer: C

Explanation:
IETF’s Focus: The Internet Engineering Task Force (IETF) primarily develops and standardizes internet
protocols operating at the Network Layer (Layer 3) and above in the OSI model.
Key Protocols: Some prominent IETF-developed protocols include:
IP (Internet Protocol): Foundation of internet addressing and routing.
TCP (Transmission Control Protocol): Reliable, connection-oriented data transport.
UDP (User Datagram Protocol): Connectionless, best-effort data transport.
DNS (Domain Name System): Translates domain names into IP addresses.
HTTP (Hypertext Transfer Protocol): Web communication.
References

QUESTION 2
What organization maintains and publishes the 802.15.4 Standard?

A. Bluetooth SIG
B. IEEE
C. IETF
D. Zigbee Alliance

Answer: B

Explanation:
IEEE 802.15.4: The IEEE 802.15.4 standard is a fundamental specification for low-rate wireless
personal area networks (LR-WPANs). It serves as the basis for many wireless IoT protocols.
IEEE’s Role: The Institute of Electrical and Electronics Engineers (IEEE) is the organization responsible
for creating, maintaining, and publishing the 802.15.4 standard.

QUESTION 3
What is the most common difference between a single board computer (SBC) and a controller board?

A. SBCs typically have connectors for display and input devices while controller boards do not
B. Controller boards have I/O headers and SBCs do not
C. SBCs always have connectors for M2 devices and controller boards do not
D. Controller boards have more powerful processors than most SBCs

Answer: A

Explanation:
SBCs (Single Board Computers): Designed as standalone, small-form-factor computers.
They often include:
Display Interfaces: HDMI, DisplayPort, etc.
Input Connections: USB for keyboards, mice, etc.
General Purpose Functionality: Can run a full operating system for wider applications.
Controller Boards: Focus on controlling specific hardware or systems.
Limited direct I/O: Limited connectors for displays/input devices.
Specialized tasks: Designed for embedded applications within larger systems.

QUESTION 4
You are considering the implementation of a lab for testing wireless equipment. What is the primary benefit of such a lab? (Choose the single best answer.)

A. Provides for testing to determine how much RF exposure you can tolerate
B. Provides a failover environment for your production systems
C. Provides a way to repurpose old hardware that is not ready for final removal
D. Provides a safe environment in which to develop practical skills and knowledge of a technology and to test the technology

Answer: D

Explanation:
Lab Purpose: Wireless testing labs offer controlled settings to:
Skill Development: Hone practical understanding of wireless technologies without impacting
production environments.
Experimentation: Safely test different configurations, compatibility, and potential issues.
Troubleshooting: Isolate problems, test solutions, and understand how equipment behaves in various
scenarios.
Other Benefits (While not the primary benefit):
Learning Environment: Ideal for structured training and exploration.
Evaluation: Compare hardware performance before deployment.
References
Benefits of IT Labs: Can be extended from wireless to broader IT experimentation and learning.
(Articles on this topic are readily available)

QUESTION 5

What is the typical range of a wireless body area network (WBAN)?

A. 1-2 meters
B. 10 square meters
C. 10 centimeters
D. 10 meters

Answer: A

Explanation:
WBAN Range: Wireless Body Area Networks (WBANs) specialize in short-range communication
around the human body. Typical ranges fall within 1-2 meters.
Purpose: This range is designed to:
Connect sensors monitoring health metrics.
Transmit data to a central coordinator device (e.g., smartphone).
Minimize interference potential with other wireless networks.

QUESTION 6
What software is typically stored in ROM and is used to initialize a device?

A. Firmware
B. Application
C. Container
D. Service

Answer: A

Explanation:
Firmware Definition: Firmware is a type of software embedded in hardware devices. It provides lowlevel
instructions that control the basic operations and initialization of the device.
ROM Storage: Firmware is typically stored in Read-Only Memory (ROM) or other forms of nonvolatile

CWNA-108 Certified Wireless Network Administrator Exam

CWNA-108 Objectives

Introduction
The Certified Wireless Network Administrator (CWNA) understands standards and operations of 802.11 wireless networks. Responsibilities include deploying, managing, monitoring, and basic troubleshooting of these networks. The CWNA has the ability to describe devices and operations of current WLAN technologies.

The CWNA exam has no prerequisites; however, the following are recommended before attempting the CWNA exam:
● Basic knowledge of networking (routers, switches, cabling, etc.)
● Basic knowledge of TCP/IP
● At least 1 year of work experience with wireless LAN technologies

The skills and knowledge measured by this examination are derived from a Job Task Analysis (JTA) involving wireless networking experts (CWNEs) and professionals. The results of this JTA were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content.
When you pass the CWNA exam, you earn credit towards the CWSP, CWDP, CWAP, and CWNE certifications and you earn the CWNA certification.
The following chart provides the breakdown of the exam as to the distribution of questions within each knowledge domain.

Radio Frequency (RF) Technologies
WLAN Regulations and Standards
WLAN Protocols and Devices
WLAN Network Architecture and Design Concepts
WLAN Network Security
RF Validation
WLAN Troubleshooting

CWNP Authorized Materials Use Policy
CWNP does not condone the use of unauthorized ‘training materials’ such as ‘brain dumps’. Individuals who utilize such materials to pass CWNP exams will have their certifications revoked. In an effort to more clearly communicate CWNP’s policy on use of unauthorized study materials, CWNP directs all certification candidates to the CWNP Candidate Conduct Policy at:


1.0 Radio Frequency (RF) Technologies – 15%
1.1 Define and explain the basic characteristics of RF and RF behavior
• Wavelength, frequency, amplitude, phase, sine waves
• RF propagation and coverage
• Reflection, refraction, diffraction and scattering
• Multipath and RF interference
• Gain and loss
• Amplification
• Attenuation
• Absorption
• Voltage Standing Wave Ratio (VSWR)
• Return Loss
• Free Space Path Loss (FSPL)

1.2 Apply the basic concepts of RF mathematics and measurement
• Watt and milliwatt
• Decibel (dB)
• dBm and dBi
• Noise floor
• SNR
• RSSI
• dBm to mW conversion rules of 10 and 3
• Equivalent Isotropically Radiated Power (EIRP)

1.3 Identify RF signal characteristics as they relate to antennas.
• RF and physical line of sight and Fresnel zone clearance
• Beamwidths
• Passive gain
• Polarization
• Antenna diversity types
• Radio chains
• Spatial multiplexing (SM)
• Transmit Beamforming (TxBF)
• Maximal Ratio Combining (MRC)
• MIMO

1.4 Explain and apply the functionality of RF antennas, antenna systems, and accessories available
• Omni-directional antennas
• Semi-directional antennas
• Highly directional antennas
• Reading Azimuth and Elevation charts for different antenna types
• Antenna orientation
• RF cables and connectors
• Lightning arrestors and grounding rods/wires

2.0 WLAN Regulations and Standards – 20%
2.1 Explain the roles of WLAN and networking industry organizations
• IEEE
• Wi-Fi Alliance
• IETF
• Regulatory domains and agencies

2.2 Explain and apply the various Physical Layer (PHY) solutions of the IEEE 802.11-2016 standard as amended including supported channel widths, spatial streams, data rates.
• DSSS – 802.11
• HR-DSSS – 802.11b
• OFDM – 802.11a
• ERP – 802.11g
• Wi-Fi 4 – HT – 802.11n
• Wi-Fi 5 – VHT – 802.11ac
• Wi-Fi 6 – HE – 802.11ax

2.3 Understand spread spectrum technologies, Modulation and Coding Schemes (MCS)
• DSSS
• OFDM
• OFDMA and Resource Units
• BPSK
• QPSK
• QAM (16, 64, 256,1024)

2.4 Identify and apply 802.11 WLAN functional concepts
• Primary channels
• Adjacent overlapping and non-overlapping channels
• Throughput vs. data rate
• Bandwidth
• Guard Interval

2.5 Describe the OSI model layers affected by the 802.11-2016 standard and amendments

2.6 Identify and comply with regulatory domain requirements and constraints (specifically in 2.4 GHz and 5 GHz)
• Frequency bands used by the 802.11 PHYs
• Available channels
• Regulatory power constraints
• Dynamic Frequency Selection (DFS)
• Transmit Power Control (TPC)

2.7 Explain basic use case scenarios for 802.11 wireless networks
• Wireless LAN (WLAN) – BSS and ESS
• Wireless bridging
• Wireless Ad-Hoc (IBSS)
• Wireless Mesh

3.0 WLAN Protocols and Devices – 20%
3.1 Describe the components and functions that make up an 802.11 wireless service set
• Stations (STAs)
• Basic Service Set (BSS) (Infrastructure mode)
• SSID
• BSSID
• Extended Service Set (ESS)
• IBSS (Ad-Hoc)
• Distribution System (DS)
• Distribution System Media (DSM)

3.2 Define terminology related to the 802.11 MAC and PHY
• MSDU, MPDU, PSDU, and PPDU
• A-MSDU and A-MPDU
• PHY preamble and header
3.3 Identify and explain the MAC frame format
• MAC frame format
• MAC addressing
3.4 Identify and explain the purpose of the three main 802.11 frame types
• Management
• Control
• Data

3.5 Explain the process used to locate and connect to a WLAN
• Scanning (active and passive)
• Authentication
• Association
• Open System Authentication and Shared Key authentication
• Connecting to 802.1X/EAP and Pre-Shared Key authentication networks
• BSS selection
• Connecting to hidden SSIDs

3.6 Explain 802.11 channel access methods
• DCF
• EDCA
• RTS/CTS
• CTS-to-Self
• NAV
• Interframe spaces (SIFS, DIFS, EIFS, AIFS)
• Physical carrier sense and virtual carrier sense
• Hidden node

3.7 Explain 802.11 MAC operations
• Roaming
• Power save modes and frame buffering
• Protection mechanisms

3.8 Describe features of, select, and install WLAN devices, control, and management systems
• Access Points (APs)
• WLAN controllers
• Wireless network management systems
• Wireless bridge and mesh APs
• Client devices

4.0 WLAN Network Architecture and Design Concepts– 15%

4.1 Describe and implement Power over Ethernet (PoE) 802.3af, 802.3at, 802.3bt
• Power Source Equipment
• Powered Device
• Midspan and endpoint PSEs
• Power classes to include power differences between PSE and PD
• Power budgets and powered port density

4.2 Define and describe differences, advantages and constraints of the different wireless LAN architectures
• Centralized data forwarding
• Distributed data forwarding
• Control, Management and Data planes
• Scalability and availability solutions
• Tunneling, QoS and VLANs

4.3 Describe design considerations for common deployment scenarios in wireless such as coverage requirements, roaming considerations, throughput, capacity and security
• Design considerations for data
• Design considerations for voice
• Design considerations for video
• Design considerations for location services including Real-Time Location Services (RTLS)
• Design considerations for highly mobile devices (e.g. tablets and smartphones)
• Capacity planning for high and very high-density environments
• Design considerations for guest access/BYOD
• Design considerations for supporting legacy 802.11 devices

4.4 Demonstrate awareness of common proprietary features in wireless networks.
• AirTime Fairness
• Band steering
• Dynamic power and channel management features

4.5 Determine and configure required network services supporting the wireless network
• DHCP for client addressing, AP addressing and/or controller discovery
• DNS for address resolution for clients and APs
• Time synchronization protocols (e.g. NTP, SNTP)
• VLANs for segmentation
• Authentication services (e.g. RADIUS, LDAP)
• Access Control Lists for segmentation
• Wired network capacity requirements

5.0 WLAN Network Security – 10%

5.1 Identify weak security options that should not be used in enterprise WLANs
• WEP
• Shared Key authentication
• SSID hiding as a security mechanism
• MAC filtering
• Use of deprecated security methods (e.g. WPA and/or WPA2 with TKIP)
• Wi-Fi Protected Setup (WPS)

5.2 Identify and configure effective security mechanisms for enterprise WLANs
• Application of AES with CCMP for encryption and integrity
• WPA2-Personal including limitations and best practices for pre-shared (PSK) use
• WPA2-Enterprise -configuring wireless networks to use 802.1X including connecting to RADIUS servers and appropriate EAP methods

5.3 Understand basic concepts of WPA3 and Opportunistic Wireless Encryption (OWE) and enhancements compared to WPA2
• Understand basic security enhancements in WPA3 vs. WPA2
• Understand basic security enhancements of encryption and integrity in WPA3 (e.g. CCMP, GCMP, AES)
• Simultaneous Authentication of Equals (SAE) in WPA3 as an enhancement for legacy pre-shared key technology
• Understand the purpose of Opportunistic Wireless Encryption (OWE) for public and guest networks

5.4 Describe common security options and tools used in wireless networks
• Access control solutions (e.g. captive portals, NAC, BYOD)
• Protected management frames
• Fast Secure Roaming methods
• Wireless Intrusion Prevention System (WIPS) and/or rogue AP detection
• Protocol and spectrum analyzers
• Best practices in secure management protocols (e.g. encrypted management HTTPS, SNMPv3, SSH2, VPN and password management)

6.0 RF Validation – 10%
6.1 Verify and document that design requirements are met including coverage, throughput, roaming, and connectivity with a post-implementation validation survey
6.2 Locate and identify sources of RF interference
• Identify RF disruption from 802.11 wireless devices including contention vs. interference and causes/sources of both including co-channel contention (CCC), overlapping channels, and 802.11 wireless device proximity
• Identify sources of RF interference from non-802.11 wireless devices based on the investigation of airtime and frequency utilization
• Understand interference mitigation options including removal of interference source or change of wireless channel usage

6.3 Perform application testing to validate WLAN performance
• Network and service availability
• VoIP testing
• Real-time application testing
• Throughput testing

6.4 Understand and use the basic features of validation tools
• Use of throughput testers for validation tasks
• Use of wireless validation software (specifically survey software and wireless scanners)
• Use of protocol analyzers for validation tasks
• Use of spectrum analyzers for validation tasks

7.0 WLAN Troubleshooting – 10%
7.1 Describe and apply common troubleshooting tools used in WLANs
• Use of protocol analyzers for troubleshooting tasks
• Use of spectrum analyzers for identifying sources of interference
• Use of management, monitoring and logging systems for troubleshooting tasks
• Use of wireless LAN scanners for troubleshooting tasks

7.2 Identify and troubleshoot common wireless issues
• Identify causes of insufficient throughput in the wireless distribution systems including LAN port speed/duplex misconfigurations, insufficient PoE budget, and insufficient Internet or WAN bandwidth
• Identify and solve RF interference using spectrum analyzers
• Identify wireless performance issues using SNR, retransmissions, and airtime utilization statistics
• Identify causes of wireless issues related to network services including DHCP, DNS, and time protocols including using native interface and IP configuration tools (e.g. pings, DNS lookups, interface configuration)
• Identify wireless issues related to security configuration mismatches

QUESTION 1
What can an impedance mismatch in the RF cables and connectors cause?

A. Increased range of the RF signal
B. Fewer MCS values in the MCS table
C. Increased amplitude of the RF signal
D. Excessive VSWR

Correct Answer: D

QUESTION 2
A WLAN transmitter that emits a 50 mW signal is connected to a cable with 3 dB loss. If the cable is connected
to an antenna with 9dBi gain, what is the EIRP at the antenna element?

A. 26 dBm
B. 13 dBm
C. 23 dBm
D. 10 dBm

Correct Answer: C

QUESTION 3
In a long-distance RF link, what statement about Fade Margin is true?

A. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.
B. The Fade Margin is a measurement of signal loss through free space and is a function of frequency and distance.
C. Fade Margin is an additional pad of signal strength designed into the RF system to compensate for unpredictable signal fading.
D. The Fade Margin of a long-distance radio link should be equivalent to the receiver’s low noise filter gain.

Correct Answer: C

 

Actualkey CWNP CWNA-108 exam pdf, Certkingdom CWNP CWNA-108 PDF

MCTS Training, MCITP Trainnig

Best CWNP CWNA-108 Certification, CWNP CWNA-108 Training at certkingdom.com

CWT-100 Certified Wireless Technician

Certified Wireless Technician (CWT)
The Certified Wireless Technician certification introduces core concepts needed to install access points (APs) based on a design document and configure an AP for initial operations and ensure connectivity.

Created For: IT Support and those installing APs

CWT Knowledge Domain
Basic Radio Frequency Characteristics
WLAN Client Features and Capabilities
WLAN Access Point Features and Capabilities
Configuration of 802.11 Security Parameters
Troubleshooting Common WLAN Connection Issues

Start Studying for your CWT!
Official Self-Study Kit
Official Study Guide
Official Practice Test
Official E-Learning

The certifications follow the typical CWNP certification path where pursuers may choose to self-teach with course materials or seek out an onsite class taught by authorized learning centers or Certified Wireless Network Trainers (CWNTs).

Both certifications are geared toward an entry-level learner and courses can be completed in one day.

Question: 1
In what way are 802.11 channels defined?

A. By a high frequency and channel width
B. By channel width alone
C. By a center frequency and channel width
D. By a low frequency and channel width

Answer: B

Question: 2
What can occur when two copies of a signal wave arrive at the receiver at the same time, but 180 degrees out
of phase which each other?

A. Increased signal amplitude
B. Bits may be added to the total count
C. Increased signal strength
D. Signal nulling or cancellation

Answer: D

Question: 3
What is defined as the bending of an RF wave as it passes through a medium? Select one:

A. Reflection
B. Refraction
C. Absorption
D. Scattering

Answer: B

Question: 4
What metric is most commonly used at the receiver to report the signal strength? Select one:

A. dBm
B. Watt
C. Milliwatt
D. Nanowatt

Answer: A

Click here to view complete Q&A of CWT-100 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best CWNP CWT-100 Certification, CWNP CWT-100 Training at certkingdom.com

CWS-100 CWS – Certified Wireless Specialist

The Certified Wireless Specialist (CWS) is a certification that validates the knowledge of wireless sales, marketing, entry-level support, and decision-making professionals related to 802.11 wireless networks.

The learning materials explain the language of Wi-Fi as well as the typical hardware and software used in wireless local area networks (WLANs). From radio frequency (RF) to Wi-Fi client devices, the CWS learns the terminology and processes of Wi-Fi.

Becoming a CWS:
The CWS certification is an entry-level WLAN certification from the vendor-neutral CWNP organization that brought you CWNA and other advanced certifications. To earn the CWS certification, you must pass an online exam with a score of 70% or higher. Those desiring to work as instructors teaching CWS classes must pass with a score of 80% or higher. Regardless of the way you choose to prepare for the CWS exam, you should start with the exam objectives, which cover the full list of knowledge tested on the exam. The CWS is a three-year certification, and it is renewed by passing the most recent version of the CWS exam again.

Primary Knowledge Domains of the CWS Exam:
Understand Basic RF Hardware and Functions – 15% of exam
Identify 802.11 Features and Functions – 30% of exam
Identify Wireless LAN Hardware and Software – 30% of exam
Understand Organizational Goals – 25% of exam

Exam objectives are available here: CWS-100 Objectives

CWS Exam Summary:
Exam Number: CWS-100
Cost: $150
Availability: Online Exam
Duration: 90 minutes
Questions: 60 multiple choice/single answer
Language: English

Question: 1
When an AP is managed by connecting to it directly and it depends on no other device for operations, what kind of AP management system is in use?

A. Cloud-based
B. Autonomous
C. Controller-based
D. Wireless Network Management System (WNMS)

Answer: B

Question: 2
In addition to coverage requirements, what primary requirements must be defined to ensure a WLAN performs as required?

A. Desired use of the 50 GHz frequency band
B. Desired use of the 10 GHz frequency band
C. User storage requirements
D. Capacity requirements

Answer: D

Question: 3
Which one of the following is an example of an antenna used mostly for bridge links?

A. Panel
B. Omnidirectional
C. Parabolic dish
D. Patch

Answer: C

Question: 4
What channel width rarely, if ever, should be used in the 2.4 GHz frequency band, even though it is supported by the standard and available devices?

A. 160 MHz
B. 20 MHz
C. 22 MHz
D. 40 MHz

Answer: A

Question: 5
Which one of the following is a non-deprecated security solution in the 802.11 standard?

A. AES (Advanced Encryption Standard)
B. WEP (Wired Equivalent Privacy)
C. RC4 (Rivest Cipher 4)
D. TKIP (Temporal Key Integrity Protocol)

Answer: A

Click here to view complete Q&A of CWS-100 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best CWS CWS-100 Certification, CWS CWS-100 Training at certkingdom.com