CWNP CWICP-202 Übungsprüfungen
Zuletzt aktualisiert am 25.04.2025- Prüfungscode: CWICP-202
- Prüfungsname: CWNP Wireless IoT Connectivity Professional (CWICP)
- Zertifizierungsanbieter: CWNP
- Zuletzt aktualisiert am: 25.04.2025
What protocol is responsible for providing MAC layer security in IEEE 802.15.4 networks?
- A . Advanced Encryption Standard (AES)
- B . IP Security (IPsec)
- C . Transport Layer Security (TLS)
- D . Wi-Fi Protected Access (WPA2)
Which of the following is a critical step in validating an IoT solution’s deployment in a production environment?
- A . Ensuring devices are physically secure
- B . Performing load testing on the network
- C . Running firmware updates on all devices
- D . Reducing device transmission power
Which technologies primarily focus on low power consumption at the PHY layer for IoT devices? (Select two)
- A . BLE
- B . Wi-Fi 6
- C . NB-IoT
- D . 5G
Which features enhance the security of IoT devices? (Select two)
- A . Secure boot
- B . Mutual authentication
- C . Data redundancy
- D . Shorter packet transmission times
What is the main advantage of using sub-1 GHz frequencies for IoT devices?
- A . Higher data rates
- B . Longer range and better penetration
- C . Increased security
- D . Lower energy consumption
Which of the following is true regarding the relationship between frequency and signal range in wireless IoT?
- A . Higher frequencies provide longer range
- B . Lower frequencies provide longer range
- C . Frequency has no impact on range
- D . Frequency only affects power consumption
Which transport layer protocols are used in IoT applications to provide data transmission? (Select two)
- A . UDP
- B . TCP
- C . CoAP
- D . MQTT
What is the primary function of the PHY layer in a wireless IoT communication stack?
- A . Managing device addressing
- B . Providing error detection and correction
- C . Converting data bits into radio signals
- D . Establishing end-to-end communication
Which of the following are considered best practices for securing wireless IoT networks? (Select two)
- A . Using default passwords
- B . Applying regular software updates
- C . Disabling unused network services
- D . Decreasing the signal range
Which techniques are used by the MAC layer to improve security in wireless IoT networks? (Select two)
- A . Data encryption
- B . Address filtering
- C . Address filtering
- D . Time slotting