Adhoc Wireless Network MCQ's




Question 1 :
In TCP-F, when a TCP sender receives an RFN packet, it goes into a state called …..


  1. Connected
  2. Snooze
  3. Standby
  4. Active
  

Question 2 :
Which antennas are used for transmitting the signals in the directional MAC scheme (DMAC-2)?


  1. Directional antennas
  2. Omnidirectional antennas
  3. Directional antennas and Omnidirectional antennas
  4. Directional antennas or Omnidirectional antennas
  

Question 3 :
In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.


  1. Routing table poisoning
  2. Route cache poisoning
  3. Routing table overflow
  4. Packet replication
  

Question 4 :
In distance vector routing algorithm, the routing tables are updated …..


  1. By exchanging information with the neighbors
  2. Automatically
  3. Using the Backup database
  4. By the Server
  

Question 5 :
A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.


  1. MAN
  2. WAN
  3. LAN
  4. None of these
  

Question 6 :
Wireless access in vehicular environments (WAVE)is a ____ .


  1. Network
  2. Protocol
  3. Sensor
  4. Hub
  

Question 7 :
In Security Aware AODV Protocol ____ .


  1. the route discovery process is initiated by
  2. the route discovery process is initiated by sending RTS
  3. the route discovery process is initiated by
  4. the route discovery process is initiated by
  

Question 8 :
Which of the following protocol was developed with the main objective of supporting integrated services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time maximizing the statistical multiplexing gain?


  1. Soft Reservation Multiple Access with Priority Assignment
  2. Hop Reservation Multiple Access Protocol
  3. Five-Phase Reservation Protocol
  4. MACA with Piggy-Backed Reservation
  

Question 9 :
In this attack, a malicious node falsely advertises good paths to the destination node during the path-finding process or in the route update messages.


  1. Active Attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  

Question 10 :
In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.


  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 11 :
In which protocol probability of colliision is very low but bandwidth utilization is very poor?


  1. BTMA
  2. FAMA
  3. MARCH
  4. PRMA
  

Question 12 :
In TCP, when ATCP is in the DISCONNECTED state then ______ .


  1. remains in normal state
  2. remains in loss state
  3. remains in congested state
  4. remains in same state
  

Question 13 :
Following are considered as characteristics of VANET.


  1. Static Topology
  2. Wired communication
  3. Fixed ifrastucture
  4. Mobility Modeling and Prediction
  

Question 14 :
When too many packets are present in the subnet, and performance degrades then it leads to….


  1. Ingestion
  2. Congestion
  3. Digestion
  4. Diffusion
  

Question 15 :
The basic idea of the aggregation scheme is based on so-called landmarks.


  1. Judging the quality of information
  2. Landmarkbased aggregation
  3. Hierarchical landmark aggregation
  4. Wired landmark
  

Question 16 :
In TCP-F, if the link between nodes rejoins, or if any of the intermediate nodes obtains a path to destination node, a ………………. is sent to sender node.


  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 17 :
Major advantage of __________ is for a high data rate, quick - low cost of deployment, enhanced services,high scalability, easy extensibility, high availability - low cost per bit.


  1. Military applications
  2. Emergency Operation
  3. Wireless Sensor Network
  4. Wireless Mesh Network
  

Question 18 :
Wormhole Attack ____ .


  1. Receives packets at one location in the network
  2. creates routing loops
  3. selectively dropping packets
  4. may leak confidential information to unauthorized-
  

Question 19 :
In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………


  1. Route failure notification (RFN) packet
  2. Explicit route disconnection notification (ERDN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 20 :
What can be expressed as the ratio of the power of the transmitted signal to the power of the same signal received by the receiver, on a given path?


  1. Path Loss
  2. Fading
  3. Interference
  4. Doppler Shift
  

Question 21 :
Which of the following is not a responsibility of a routing protocol in wireless ad hoc Networks?


  1. Exchanging the route information
  2. Gathering information about the path breaks
  3. Mending the broken paths expending minimum processing power and bandwidth
  4. Utilizing maximum bandwidth
  

Question 22 :
Which of the following protocol is Contention-Based Protocols with Scheduling Mechanisms?


  1. RI-BTMA
  2. MARCH
  3. DLPS
  4. MACA-BI
  

Question 23 :
What does ATP stand for?


  1. Ad Hoc Transport Protocol
  2. Ad Transfer Protocol
  3. Ad Hoc Transmission Protocol
  4. Ad Hoc Transfer Protocol
  

Question 24 :
Repudiation refers to the ____- .


  1. attempted denial by a node involved in a communication
  2. selection of node involved in a communication of having
  3. selectively dropping packets
  4. disrupt the normal operation of the network
  

Question 25 :
In WPA, a choice can be made between either __________ or WEP2.


  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 26 :
TCP Over AD HOC Wireless Networks __-


  1. Provides a byte stream based service
  2. Minimize overall transmission power for each connection
  3. Reduce bandwidth consumption
  4. Increases bandwidth consumption
  

Question 27 :
Which of the Following is the Issue in designing a routing protocol for Wireless Ad-Hoc Networks?


  1. Measure TCP performance
  2. Measure UDP performance
  3. Measure IP performance
  4. Measure IPV6 performance
  

Question 28 :
Which of the following is the main components of MACA/PR?


  1. FTP
  2. SNMP
  3. QoS routing protocol
  4. SMTP
  

Question 29 :
The attack effected by making the network resource unavailable for service to other nodes, either by consuming the bandwidth or by overloading the system, is known as …..


  1. Denial of service
  2. Host impersonation
  3. Information disclosure
  4. Interference
  

Question 30 :
What is the first step toward a QoS-aware routing protocol ?


  1. Transmitting a packet
  2. Finding the path
  3. Round trip time
  4. Reliability
  
Pages