Adhoc Wireless Network MCQ's




Question 121 :
Which of the following protocol is Receiver-Initiated protocol of Contention-Based protocols?


  1. DLPS
  2. DWOP
  3. DPS
  4. MARCH
  

Question 122 :
Location disclosure attack targets _______ Layer.


  1. Physical
  2. Transport
  3. Network
  4. Datalink
  

Question 123 :
Which of the following protocol uses a novel rate adaptation approach?


  1. Interleaved Carrier-Sense Multiple Access Protocol
  2. Receiver-Based Autorate Protocol
  3. Power Control MAC Protocol for Ad Hoc Networks
  4. Multichannel CSMAMAC Protocol
  

Question 124 :
Which control packets are used for transmitting best-effort packets in RTMAC protocol?


  1. RTS
  2. CTS
  3. ACK
  4. RTS, CTS and ACK
  

Question 125 :
When using ________there is a shared key between all the stations and access points.


  1. WPA
  2. WEP
  3. ICV
  4. SSID
  

Question 126 :
Which priority scheduling scheme uses scheduling decisions are made taking into consideration the states of neighboring nodes and the feedback from destination nodes regarding packet losses?


  1. Distributed Laxity-Based Priority Scheduling Scheme
  2. Distributed Wireless Ordering Protocol
  3. Distributed Priority Scheduling and Medium Access in Ad Hoc Networks
  4. distributed priority scheduling (DPS)
  

Question 127 :
In ad hoc TCP (ATCP), when an intermediate node finds that the network is partitioned, then the TCP sender state is changed to the ………… state where it avoids unnecessary retransmissions.


  1. Active
  2. Persist
  3. Congestion control state
  4. Retransmit state
  

Question 128 :
In this type of attack, an adversary attempts to prevent consume/waste away resources of other nodes present in the network.


  1. Resource consumption attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  

Question 129 :
Classification of MAC Protocol consist of ___ .


  1. Contention based protocol
  2. Security based protocol
  3. Power control MAC Protocol
  4. Receiver based Autorate protocol
  

Question 130 :
In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.


  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 131 :
Once the TCP-ELFN sender receives the ELFN packet, enters a ________ state.


  1. Previous sender
  2. Snooze
  3. Standby
  4. Null
  

Question 132 :
What is the objective of a transport layer protocol?


  1. Routing
  2. Framing
  3. Encoding
  4. congestion control
  

Question 133 :
What is VANET stands for ______ .


  1. Vehicular AdHoc Network
  2. Vehicular Address Network
  3. Vehicular Adhoc Neural Network
  4. Wireless Sensor Networks
  

Question 134 :
_____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.


  1. WEP
  2. WPA
  3. WPA2
  4. IEEE 802.11
  

Question 135 :
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?


  1. CSMA/CD
  2. CDMA
  3. CSMA/CA
  4. ALOHA
  

Question 136 :
In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.


  1. Routing table poisoning
  2. Route cache poisoning
  3. Routing table overflow
  4. Packet replication
  

Question 137 :
Application Controlled Transport Protocol ______


  1. Provides freedom of choosing the required choosing the required
  2. Is very compatible with TCP
  3. Is very not compatible with TCP
  4. is Less dependent on routing protocol
  

Question 138 :
TCP WITH EXPLICIT LINK FAILURE NOTIFICATION: ( TCP-ELFN) ____ .


  1. Improves TCP performance in Adhoc-Wireless-Network
  2. services from network and physical layers for improving its
  3. services from network and MAC layers for improving its
  4. services from network and CSMA layers for improving its
  

Question 139 :
TCP uses ________- .


  1. a sliding window for flow control.
  2. high bandwith
  3. wired communication
  4. services from network and MAC layers for improving its
  

Question 140 :
Which one of the following event is not possible in wireless LAN?


  1. Collision detection
  2. Acknowledgeme nt of data frames
  3. Multi-mode data transmission
  4. Connection to wired networks
  

Question 141 :
Which of the following protocol is a light-weight transport layer protocol?


  1. TCP-F
  2. Split-TCP
  3. Application Controlled Transport Protocol
  4. TCP-BuS
  

Question 142 :
In AODV routing algorithm for MANETs, the route is discovered at time …


  1. Only when the network is established
  2. In middle of the transmission
  3. When there is a need for route by the host
  4. When there is no need for route by the host
  

Question 143 :
When using ________there is a shared key between all the stations and access points.


  1. WPA
  2. WEP
  3. ICV
  4. SSID
  

Question 144 :
Two known attacks on WPA are ____________ and DOS attack.


  1. Session Hijacking
  2. Dictionary Attack
  3. Rushing Attack
  4. Jamming
  

Question 145 :
Which of the following model have a temporal dependency behavior?


  1. Random Walk Model
  2. Smooth Random Mobility Model
  3. The Random Waypoint Model
  4. Random Direction Model
  

Question 146 :
Hidden terninals are nodes that are ……


  1. configured on the network
  2. hidden from the sender of the session
  3. available with sender
  4. hidden from receiver of the session
  

Question 147 :
Two known attacks on WPA are ____________ and DOS attack.


  1. Session Hijacking
  2. Dictionary Attack
  3. Rushing Attack
  4. Jamming
  

Question 148 :
How attacks against ad hoc wireless networks are generally classified into?


  1. Passive and active attacks
  2. Active attacks
  3. Passive attacks
  4. Passive or active attacks
  

Question 149 :
What is defined as the change/shift in the frequency of the received signal when the transmitter and the receiver are mobile with respect to each other?


  1. Path Loss
  2. Fading
  3. Interference
  4. Doppler Shift
  

Question 150 :
What are the components of Real-Time Medium Access Control Protocol?


  1. MAC layer protocol
  2. QoS routing protocol
  3. MAC layer protocol and QoS routing protocol
  4. MAC layer protocol or QoS routing protocol
  
Pages