CWNP CWICP-202 CWNP Wireless IoT Connectivity Professional (CWICP) Online Training
CWNP CWICP-202 Online Training
The questions for CWICP-202 were last updated at Feb 20,2025.
- Exam Code: CWICP-202
- Exam Name: CWNP Wireless IoT Connectivity Professional (CWICP)
- Certification Provider: CWNP
- Latest update: Feb 20,2025
In wireless IoT troubleshooting, what can cause excessive retries and packet loss in a communication session?
- A . High signal-to-noise ratio
- B . Congested frequency channels
- C . Use of encryption
- D . Low bandwidth usage
Which of the following wireless IoT technologies support mesh networking? (Select two)
- A . Zigbee
- B . LTE-M
- C . Bluetooth Mesh
- D . Wi-Fi
What strategies can help mitigate risks in wireless IoT networks? (Select two)
- A . Disabling device firmware updates
- B . Using encryption for data transmission
- C . Regularly auditing network access
- D . Minimizing authentication checks
Which of the following are common threats in wireless IoT networks? (Select two)
- A . Man-in-the-middle attacks
- B . Data compression
- C . Eavesdropping
- D . Signal boosting
Which responsibilities are associated with the PHY layer in a wireless IoT network? (Select two)
- A . Modulating and demodulating data signals
- B . Encrypting data for transmission
- C . Managing frequency channels
- D . Addressing devices in the network
Which of the following are key principles of IoT security? (Select two)
- A . Confidentiality
- B . Integrity
- C . Data replication
- D . Signal strength
Which wireless IoT technologies use the IEEE 802.15.4 MAC standard? (Select two)
- A . Zigbee
- B . Wi-Fi
- C . Thread
- D . LoRaWAN
What is the main advantage of using sub-1 GHz frequencies for IoT devices?
- A . Higher data rates
- B . Longer range and better penetration
- C . Increased security
- D . Lower energy consumption
Which of the following is a key function of the MAC layer in IoT devices using Wi-Fi?
- A . Data encryption
- B . Modulation and demodulation
- C . Packet framing and error checking
- D . Carrier sense and collision avoidance
Which techniques are used by the MAC layer to improve security in wireless IoT networks? (Select two)
- A . Data encryption
- B . Address filtering
- C . Address filtering
- D . Time slotting