Question 121 :
Which of the following protocol is Receiver-Initiated protocol of Contention-Based protocols?
- DLPS
- DWOP
- DPS
- MARCH
Question 122 :
Location disclosure attack targets _______ Layer.
- Physical
- Transport
- Network
- Datalink
Question 123 :
Which of the following protocol uses a novel rate adaptation approach?
- Interleaved Carrier-Sense Multiple Access Protocol
- Receiver-Based Autorate Protocol
- Power Control MAC Protocol for Ad Hoc Networks
- Multichannel CSMAMAC Protocol
Question 124 :
Which control packets are used for transmitting best-effort packets in RTMAC protocol?
- RTS
- CTS
- ACK
- RTS, CTS and ACK
Question 125 :
When using ________there is a shared key between all the stations and access points.
- WPA
- WEP
- ICV
- SSID
Question 126 :
Which priority scheduling scheme uses scheduling decisions are made taking into consideration the states of neighboring nodes and the feedback from destination nodes regarding packet losses?
- Distributed Laxity-Based Priority Scheduling Scheme
- Distributed Wireless Ordering Protocol
- Distributed Priority Scheduling and Medium Access in Ad Hoc Networks
- distributed priority scheduling (DPS)
Question 127 :
In ad hoc TCP (ATCP), when an intermediate node finds that the network is partitioned, then the TCP sender state is changed to the ………… state where it avoids unnecessary retransmissions.
- Active
- Persist
- Congestion control state
- Retransmit state
Question 128 :
In this type of attack, an adversary attempts to prevent consume/waste away resources of other nodes present in the network.
- Resource consumption attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack
Question 129 :
Classification of MAC Protocol consist of ___ .
- Contention based protocol
- Security based protocol
- Power control MAC Protocol
- Receiver based Autorate protocol
Question 130 :
In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 131 :
Once the TCP-ELFN sender receives the ELFN packet, enters a ________ state.
- Previous sender
- Snooze
- Standby
- Null
Question 132 :
What is the objective of a transport layer protocol?
- Routing
- Framing
- Encoding
- congestion control
Question 133 :
What is VANET stands for ______ .
- Vehicular AdHoc Network
- Vehicular Address Network
- Vehicular Adhoc Neural Network
- Wireless Sensor Networks
Question 134 :
_____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.
- WEP
- WPA
- WPA2
- IEEE 802.11
Question 135 :
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
- CSMA/CD
- CDMA
- CSMA/CA
- ALOHA
Question 136 :
In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.
- Routing table poisoning
- Route cache poisoning
- Routing table overflow
- Packet replication
Question 137 :
Application Controlled Transport Protocol ______
- Provides freedom of choosing the required choosing the required
- Is very compatible with TCP
- Is very not compatible with TCP
- is Less dependent on routing protocol
Question 138 :
TCP WITH EXPLICIT LINK FAILURE NOTIFICATION: ( TCP-ELFN) ____ .
- Improves TCP performance in Adhoc-Wireless-Network
- services from network and physical layers for improving its
- services from network and MAC layers for improving its
- services from network and CSMA layers for improving its
Question 139 :
TCP uses ________- .
- a sliding window for flow control.
- high bandwith
- wired communication
- services from network and MAC layers for improving its
Question 140 :
Which one of the following event is not possible in wireless LAN?
- Collision detection
- Acknowledgeme nt of data frames
- Multi-mode data transmission
- Connection to wired networks
Question 141 :
Which of the following protocol is a light-weight transport layer protocol?
- TCP-F
- Split-TCP
- Application Controlled Transport Protocol
- TCP-BuS
Question 142 :
In AODV routing algorithm for MANETs, the route is discovered at time …
- Only when the network is established
- In middle of the transmission
- When there is a need for route by the host
- When there is no need for route by the host
Question 143 :
When using ________there is a shared key between all the stations and access points.
- WPA
- WEP
- ICV
- SSID
Question 144 :
Two known attacks on WPA are ____________ and DOS attack.
- Session Hijacking
- Dictionary Attack
- Rushing Attack
- Jamming
Question 145 :
Which of the following model have a temporal dependency behavior?
- Random Walk Model
- Smooth Random Mobility Model
- The Random Waypoint Model
- Random Direction Model
Question 146 :
Hidden terninals are nodes that are ……
- configured on the network
- hidden from the sender of the session
- available with sender
- hidden from receiver of the session
Question 147 :
Two known attacks on WPA are ____________ and DOS attack.
- Session Hijacking
- Dictionary Attack
- Rushing Attack
- Jamming
Question 148 :
How attacks against ad hoc wireless networks are generally classified into?
- Passive and active attacks
- Active attacks
- Passive attacks
- Passive or active attacks
Question 149 :
What is defined as the change/shift in the frequency of the received signal when the transmitter and the receiver are mobile with respect to each other?
- Path Loss
- Fading
- Interference
- Doppler Shift
Question 150 :
What are the components of Real-Time Medium Access Control Protocol?
- MAC layer protocol
- QoS routing protocol
- MAC layer protocol and QoS routing protocol
- MAC layer protocol or QoS routing protocol