Adhoc Wireless Network MCQ's




Question 91 :
Which is type of Table driven Routing Protocol?


  1. AODV
  2. CSGR
  3. STAR
  4. CSMA
  

Question 92 :
The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.


  1. FAMA
  2. BTMA
  3. MACA
  4. MACAW
  

Question 93 :
Which of the following protocol is based on a channel access discipline which consists of a carrier-sensing operation and a collision-avoidance dialog between the sender and the intended receiver of a packet?


  1. Media Access with Reduced Handshake
  2. Floor Acquisition Multiple Access Protocols
  3. MACA-By Invitation
  4. Busy Tone Multiple Access Protocols
  

Question 94 :
Which is a proactive routing information update protocol?


  1. AODV
  2. STAR
  3. DSR
  4. FORP
  

Question 95 :
Which of the following protocol does not require global synchronization among nodes?


  1. RTMAC
  2. MACA/PR
  3. MAC
  4. RT
  

Question 96 :
In WPA, a choice can be made between either __________ or WEP2.


  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 97 :
Spoofing attack is not considered in ____________


  1. AODV
  2. DSR
  3. ARAN
  4. ARNA
  

Question 98 :
Which is a hybrid routing protocol?


  1. DSR
  2. AODV
  3. ZRP
  4. QMR
  

Question 99 :
_____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.


  1. WEP
  2. WPA
  3. WPA2
  4. IEEE 802.11
  

Question 100 :
_____________is very important for bandwidth reservations by nodes.


  1. Bandwidth efficiency
  2. Quality of service support
  3. Synchronisation
  4. Hidden and ExposedTerminalProblem
  

Question 101 :
Denial of Service attack targets _______ Layer.


  1. Physical
  2. Multi
  3. Network
  4. Datalink
  

Question 102 :
Which of the following is not a advantage of Split-TCP?


  1. Improved throughput
  2. Improved throughput fairness
  3. lessened impact of mobility
  4. It requires modifications to TCP protocol
  

Question 103 :
Which is not a reactive routing information update protocol?


  1. DSR
  2. AODV
  3. DSDV
  4. FORP
  

Question 104 :
Delay-Tolerant Routing is used in __-


  1. Delivering advertisements
  2. Sensing element
  3. Path finding
  4. Information Processing
  

Question 105 :
Internal attacks are from ____ .


  1. Compromised- nodes that are actually part of the network
  2. carried out by nodes that do not belong to the network
  3. carried out by nodes that belong to the network
  4. Receiver
  

Question 106 :
Which of the following protocol eliminates the need for the RTS packet?


  1. Media Access with Reduced Handshake
  2. MACA-By Invitation
  3. Receiver-Initiated Busy Tone Multiple Access Protocol
  4. Dual Busy Tone Multiple Access Protocol
  

Question 107 :
The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.


  1. Column Mobility Model
  2. Overlap Mobility Model
  3. In-Place Mobility Model
  4. Reference Point Group Mobility Model
  

Question 108 :
In TCP-ELFN, the node detecting a path break upon detection of a link failure to the TCP sender. How many ways this can be implemented ?


  1. 1
  2. 2
  3. 3
  4. 4
  

Question 109 :
Main function of Temporally ordered routing algorithm(TORA) is ____- .


  1. Establishing, maintaining, and erasing routes
  2. Efficiency, finding routes
  3. Finding location, Relocating
  4. Finding Routes
  

Question 110 :
The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.


  1. Five Phase Reservation Protocols(FPR P) Reservation Necessary information to the receiver nodes
  2. Media Access Protocol for Wireless LANs(MACAW) Protocol for Voice support in Adhoc-Wireless-Network
  3. Busy Tone Multiple Access Protocols(BTM A) Multiple Access RTR packets transmitted by receiver
  4. Distributed Packet Reservation Multiple Access Packet Protocol (D-Hidden terminals about the impending DATA packets
  

Question 111 :
Which of the following is the major reason behind throughput degradation that TCP faces when used in ad hoc wireless networks?


  1. Routing
  2. Symmetric link behavior
  3. Effect of path length
  4. Low bit error rate
  

Question 112 :
When a TCP connection is established, the ATCP sender state is in ………. .


  1. CONGESTED
  2. LOST
  3. NORMAL
  4. DISCONN
  

Question 113 :
WPA uses ___________Algorithm to check integrity of the packets.


  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 114 :
In frequent path breaks, TCP enters a slow start phase if _________


  1. RouteRecong.<= RTO
  2. RouteRecong.
  3. RouteRecong.=> RTO
  4. RouteRecong.>R TO
  

Question 115 :
TCP with buffering capability and sequence information (TCP-BuS) use ABR routing scheme special messages ………….., defined as part of ABR for finding a partial path.


  1. Localized query (LQ)
  2. REPLY
  3. Localized query (LQ) and REPLY
  4. Localized query (LQ) or REPLY
  

Question 116 :
What type of routing is used in VANET?


  1. Single layer routing
  2. Cross Layer Routing
  3. Hybrid Routing
  4. AP Routing
  

Question 117 :
RRTS means ______- .


  1. Request-for- Request-toSend
  2. Repeat-Requestto-Rend
  3. ReceiveRequest-ofTrasmit-Siignal
  4. Return- Request-ofTrasmit-Siignal
  

Question 118 :
Wireless routing protocol is an example of _____________ .


  1. Proactive routing protocol
  2. Reactive routing protocol
  3. Hybrid routing protocol
  4. Source initiated Routing Protocol
  

Question 119 :
In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the


  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 120 :
In this attack, a malicious node tries to consume/waste away resources of other nodes present in the network.


  1. Resource consumption attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  
Pages