Question 91 :
Which is type of Table driven Routing Protocol?
- AODV
- CSGR
- STAR
- CSMA
Question 92 :
The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.
- FAMA
- BTMA
- MACA
- MACAW
Question 93 :
Which of the following protocol is based on a channel access discipline which consists of a carrier-sensing operation and a collision-avoidance dialog between the sender and the intended receiver of a packet?
- Media Access with Reduced Handshake
- Floor Acquisition Multiple Access Protocols
- MACA-By Invitation
- Busy Tone Multiple Access Protocols
Question 94 :
Which is a proactive routing information update protocol?
- AODV
- STAR
- DSR
- FORP
Question 95 :
Which of the following protocol does not require global synchronization among nodes?
- RTMAC
- MACA/PR
- MAC
- RT
Question 96 :
In WPA, a choice can be made between either __________ or WEP2.
- TKIP
- SAP
- DOA
- TKP
Question 97 :
Spoofing attack is not considered in ____________
- AODV
- DSR
- ARAN
- ARNA
Question 98 :
Which is a hybrid routing protocol?
- DSR
- AODV
- ZRP
- QMR
Question 99 :
_____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.
- WEP
- WPA
- WPA2
- IEEE 802.11
Question 100 :
_____________is very important for bandwidth reservations by nodes.
- Bandwidth efficiency
- Quality of service support
- Synchronisation
- Hidden and ExposedTerminalProblem
Question 101 :
Denial of Service attack targets _______ Layer.
- Physical
- Multi
- Network
- Datalink
Question 102 :
Which of the following is not a advantage of Split-TCP?
- Improved throughput
- Improved throughput fairness
- lessened impact of mobility
- It requires modifications to TCP protocol
Question 103 :
Which is not a reactive routing information update protocol?
- DSR
- AODV
- DSDV
- FORP
Question 104 :
Delay-Tolerant Routing is used in __-
- Delivering advertisements
- Sensing element
- Path finding
- Information Processing
Question 105 :
Internal attacks are from ____ .
- Compromised- nodes that are actually part of the network
- carried out by nodes that do not belong to the network
- carried out by nodes that belong to the network
- Receiver
Question 106 :
Which of the following protocol eliminates the need for the RTS packet?
- Media Access with Reduced Handshake
- MACA-By Invitation
- Receiver-Initiated Busy Tone Multiple Access Protocol
- Dual Busy Tone Multiple Access Protocol
Question 107 :
The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.
- Column Mobility Model
- Overlap Mobility Model
- In-Place Mobility Model
- Reference Point Group Mobility Model
Question 108 :
In TCP-ELFN, the node detecting a path break upon detection of a link failure to the TCP sender. How many ways this can be implemented ?
- 1
- 2
- 3
- 4
Question 109 :
Main function of Temporally ordered routing algorithm(TORA) is ____- .
- Establishing, maintaining, and erasing routes
- Efficiency, finding routes
- Finding location, Relocating
- Finding Routes
Question 110 :
The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.
- Five Phase Reservation Protocols(FPR P) Reservation Necessary information to the receiver nodes
- Media Access Protocol for Wireless LANs(MACAW) Protocol for Voice support in Adhoc-Wireless-Network
- Busy Tone Multiple Access Protocols(BTM A) Multiple Access RTR packets transmitted by receiver
- Distributed Packet Reservation Multiple Access Packet Protocol (D-Hidden terminals about the impending DATA packets
Question 111 :
Which of the following is the major reason behind throughput degradation that TCP faces when used in ad hoc wireless networks?
- Routing
- Symmetric link behavior
- Effect of path length
- Low bit error rate
Question 112 :
When a TCP connection is established, the ATCP sender state is in ………. .
- CONGESTED
- LOST
- NORMAL
- DISCONN
Question 113 :
WPA uses ___________Algorithm to check integrity of the packets.
- TKIP
- SAP
- DOA
- TKP
Question 114 :
In frequent path breaks, TCP enters a slow start phase if _________
- RouteRecong.<= RTO
- RouteRecong.
Question 115 :
TCP with buffering capability and sequence information (TCP-BuS) use ABR routing scheme special messages ………….., defined as part of ABR for finding a partial path.
- Localized query (LQ)
- REPLY
- Localized query (LQ) and REPLY
- Localized query (LQ) or REPLY
Question 116 :
What type of routing is used in VANET?
- Single layer routing
- Cross Layer Routing
- Hybrid Routing
- AP Routing
Question 117 :
RRTS means ______- .
- Request-for- Request-toSend
- Repeat-Requestto-Rend
- ReceiveRequest-ofTrasmit-Siignal
- Return- Request-ofTrasmit-Siignal
Question 118 :
Wireless routing protocol is an example of _____________ .
- Proactive routing protocol
- Reactive routing protocol
- Hybrid routing protocol
- Source initiated Routing Protocol
Question 119 :
In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 120 :
In this attack, a malicious node tries to consume/waste away resources of other nodes present in the network.
- Resource consumption attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack