Question 1 :
In TCP-F, when a TCP sender receives an RFN packet, it goes into a state called …..
- Connected
- Snooze
- Standby
- Active
Question 2 :
Which antennas are used for transmitting the signals in the directional MAC scheme (DMAC-2)?
- Directional antennas
- Omnidirectional antennas
- Directional antennas and Omnidirectional antennas
- Directional antennas or Omnidirectional antennas
Question 3 :
In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.
- Routing table poisoning
- Route cache poisoning
- Routing table overflow
- Packet replication
Question 4 :
In distance vector routing algorithm, the routing tables are updated …..
- By exchanging information with the neighbors
- Automatically
- Using the Backup database
- By the Server
Question 5 :
A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.
- MAN
- WAN
- LAN
- None of these
Question 6 :
Wireless access in vehicular environments (WAVE)is a ____ .
- Network
- Protocol
- Sensor
- Hub
Question 7 :
In Security Aware AODV Protocol ____ .
- the route discovery process is initiated by
- the route discovery process is initiated by sending RTS
- the route discovery process is initiated by
- the route discovery process is initiated by
Question 8 :
Which of the following protocol was developed with the main objective of supporting integrated services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time maximizing the statistical multiplexing gain?
- Soft Reservation Multiple Access with Priority Assignment
- Hop Reservation Multiple Access Protocol
- Five-Phase Reservation Protocol
- MACA with Piggy-Backed Reservation
Question 9 :
In this attack, a malicious node falsely advertises good paths to the destination node during the path-finding process or in the route update messages.
- Active Attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack
Question 10 :
In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 11 :
In which protocol probability of colliision is very low but bandwidth utilization is very poor?
- BTMA
- FAMA
- MARCH
- PRMA
Question 12 :
In TCP, when ATCP is in the DISCONNECTED state then ______ .
- remains in normal state
- remains in loss state
- remains in congested state
- remains in same state
Question 13 :
Following are considered as characteristics of VANET.
- Static Topology
- Wired communication
- Fixed ifrastucture
- Mobility Modeling and Prediction
Question 14 :
When too many packets are present in the subnet, and performance degrades then it leads to….
- Ingestion
- Congestion
- Digestion
- Diffusion
Question 15 :
The basic idea of the aggregation scheme is based on so-called landmarks.
- Judging the quality of information
- Landmarkbased aggregation
- Hierarchical landmark aggregation
- Wired landmark
Question 16 :
In TCP-F, if the link between nodes rejoins, or if any of the intermediate nodes obtains a path to destination node, a ………………. is sent to sender node.
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 17 :
Major advantage of __________ is for a high data rate, quick - low cost of deployment, enhanced services,high scalability, easy extensibility, high availability - low cost per bit.
- Military applications
- Emergency Operation
- Wireless Sensor Network
- Wireless Mesh Network
Question 18 :
Wormhole Attack ____ .
- Receives packets at one location in the network
- creates routing loops
- selectively dropping packets
- may leak confidential information to unauthorized-
Question 19 :
In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………
- Route failure notification (RFN) packet
- Explicit route disconnection notification (ERDN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 20 :
What can be expressed as the ratio of the power of the transmitted signal to the power of the same signal received by the receiver, on a given path?
- Path Loss
- Fading
- Interference
- Doppler Shift
Question 21 :
Which of the following is not a responsibility of a routing protocol in wireless ad hoc Networks?
- Exchanging the route information
- Gathering information about the path breaks
- Mending the broken paths expending minimum processing power and bandwidth
- Utilizing maximum bandwidth
Question 22 :
Which of the following protocol is Contention-Based Protocols with Scheduling Mechanisms?
- RI-BTMA
- MARCH
- DLPS
- MACA-BI
Question 23 :
What does ATP stand for?
- Ad Hoc Transport Protocol
- Ad Transfer Protocol
- Ad Hoc Transmission Protocol
- Ad Hoc Transfer Protocol
Question 24 :
Repudiation refers to the ____- .
- attempted denial by a node involved in a communication
- selection of node involved in a communication of having
- selectively dropping packets
- disrupt the normal operation of the network
Question 25 :
In WPA, a choice can be made between either __________ or WEP2.
- TKIP
- SAP
- DOA
- TKP
Question 26 :
TCP Over AD HOC Wireless Networks __-
- Provides a byte stream based service
- Minimize overall transmission power for each connection
- Reduce bandwidth consumption
- Increases bandwidth consumption
Question 27 :
Which of the Following is the Issue in designing a routing protocol for Wireless Ad-Hoc Networks?
- Measure TCP performance
- Measure UDP performance
- Measure IP performance
- Measure IPV6 performance
Question 28 :
Which of the following is the main components of MACA/PR?
- FTP
- SNMP
- QoS routing protocol
- SMTP
Question 29 :
The attack effected by making the network resource unavailable for service to other nodes, either by consuming the bandwidth or by overloading the system, is known as …..
- Denial of service
- Host impersonation
- Information disclosure
- Interference
Question 30 :
What is the first step toward a QoS-aware routing protocol ?
- Transmitting a packet
- Finding the path
- Round trip time
- Reliability