Question 1 : Which of the following is not a responsibility of a routing protocol in wireless ad hoc Networks?
- Exchanging the route information
- Gathering information about the path breaks
- Mending the broken paths expending minimum processing power and bandwidth
- Utilizing maximum bandwidth
Question 2 : For forwarding data packet from one node to another following protocol in VANET can be used --------- .
- Delay Tolerant Network
- TCP/IP
- UDP
- IP
Question 3 : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 4 : What can be expressed as the ratio of the power of the transmitted signal to the power of the same signal received by the receiver, on a given path?
- Path Loss
- Fading
- Interference
- Doppler Shift
Question 5 : In Security Aware AODV Protocol ------ .
- the route discovery process is initiated by
- the route discovery process is initiated by sending RTS
- the route discovery process is initiated by
- the route discovery process is initiated by
Question 6 : The network in which all the nodes are symmetric and there is no central control or hierarchy is ……
- MANET
- Client-Server Technology
- Peer-to-Peer
- VANET
Question 7 : Wormhole Attack ------ .
- Receives packets at one location in the network
- creates routing loops
- selectively dropping packets
- may leak confidential information to unauthorized-
Question 8 : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.
- Passive Atttack
- Active Attack
- Snooping
- Jamming
Question 9 : In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………
- Route failure notification (RFN) packet
- Explicit route disconnection notification (ERDN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 10 : In which protocol probability of colliision is very low but bandwidth utilization is very poor?
- BTMA
- FAMA
- MARCH
- PRMA
Question 11 : In this ________ attack, an adversary node replicates stale packets.
- Routing table poisoning
- Route cache poisoning
- Packet replication
- Routing table overflow
Question 12 : Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless network?
- Distributed arbitration for the shared channel for transmission of packets
- Quality of Service
- Throughput
- Routing
Question 13 : The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.
- FAMA
- BTMA
- MACA
- MACAW
Question 14 : Ad-hoc network connects each computer using which network topology?
- Three
- Mesh
- Star
- Bus
Question 15 : What is the first step toward a QoS-aware routing protocol ?
- Transmitting a packet
- Finding the path
- Round trip time
- Reliability
Question 16 : In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?
- BTMA
- FAMA
- MARCH
- PRMA
Question 17 : Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?
- Proactive Routing Protocol
- Hybrid Routing Protocol
- Power Aware Routing Protocol
- Reactive Routing Protocol
Question 18 : IEEE 802.2: specifies……
- the Logical Link Control (LLC)
- the Phisical Link Control (PLC)
- OSI Layers
- the Route Link Control (RLC)
Question 19 : In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.
- Source id
- Sequence number
- Destination id
- Receiver id
Question 20 : In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the availability of a partial path to destination is intimated to theTCP-BuS sender through an ……
- Route failure notification (RFN) packet
- Explicit route disconnection notification (ERDN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 21 : The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.
- Column Mobility Model
- Overlap Mobility Model
- In-Place Mobility Model
- Reference Point Group Mobility Model
Question 22 : Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced services,high scalability, easy extensibility, high availability & low cost per bit.
- Military applications
- Emergency Operation
- Wireless Sensor Network
- Wireless Mesh Network
Question 23 : Which antennas are used for transmitting the signals in the directional MAC scheme (DMAC-2)?
- Directional antennas
- Omnidirectional antennas
- Directional antennas and Omnidirectional antennas
- Directional antennas or Omnidirectional antennas
Question 24 : Communication in vehicular environment are provided by ----- .
- using a OSI Model
- using a wireless medium 802.11p which is based out of 802.11 standard
- Satellite communication
- using a wireless medium 820.11p which is based out of
Question 25 : What does ATP stand for?
- Ad Hoc Transport Protocol
- Ad Transfer Protocol
- Ad Hoc Transmission Protocol
- Ad Hoc Transfer Protocol
Question 26 : Which of the following protocol is Receiver-Initiated protocol of Contention-Based protocols?
- DLPS
- DWOP
- DPS
- MARCH
Question 27 : The objectives of transport layer protocol include:
- Bandwidth allocation
- end-to-end delivery of data packets
- Path finding
- Speed of transmission
Question 28 : One advantage that DSR has over DSDV due to its on-demand nature.
- New link is generated
- Routing adapts to load
- Sequence number is updated
- No New link is generated
Question 29 : Which of the following protocol does not require global synchronization among nodes?
- RTMAC
- MACA/PR
- MAC
- RT
Question 30 : Wireless routing protocol is an example of _____________ .
- Proactive routing protocol
- Reactive routing protocol
- Hybrid routing protocol
- Source initiated Routing Protocol
Question 31 : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.
- Passive Atttack
- Active Attack
- Snooping
- Jamming
Question 32 : Which of the following protocol eliminates the need for the RTS packet?
- Media Access with Reduced Handshake
- MACA-By Invitation
- Receiver-Initiated Busy Tone Multiple Access Protocol
- Dual Busy Tone Multiple Access Protocol
Question 33 : Classification of MAC Protocol consist of ___ .
- Contention based protocol
- Security based protocol
- Power control MAC Protocol
- Receiver based Autorate protocol
Question 34 : The attack effected by making the network resource unavailable for service to other nodes, either by consuming the bandwidth or by overloading the system, is known as …..
- Denial of service
- Host impersonation
- Information disclosure
- Interference
Question 35 : Which is TCP protocol cannot be used for the issue of "Dependency on routing protocol "?
- TCP-ELFN
- TCP-F
- SPLIT TCP
- TCP-BUS
Question 36 : The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.
- "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"
- "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless network "
- "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "
- "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the impending DATA packets"
Question 37 : In this ________ attack, an adversary node replicates stale packets.
- Routing table poisoning
- Route cache poisoning
- Packet replication
- Routing table overflow
Question 38 : Wireless access in vehicular environments (WAVE)is a ------ .
- Network
- Protocol
- Sensor
- Hub
Question 39 : Denial of Service attack targets _______ Layer.
- Physical
- Multi
- Network
- Datalink
Question 40 : Which of the following protocol is based on a channel access discipline which consists of a carrier-sensing operation and a collision-avoidance dialog between the sender and the intended receiver of a packet?
- Media Access with Reduced Handshake
- Floor Acquisition Multiple Access Protocols
- MACA-By Invitation
- Busy Tone Multiple Access Protocols
Question 41 : In TCP-F, when a TCP sender receives an RFN packet, it goes into a state called …..
- Connected
- Snooze
- Standby
- Active
Question 42 : Which of the following criteria is used to categories MAC protocols for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Reservation approaches
- Broadcast Channel
Question 43 : Vehicular adhoc network (VANET) is a tupr of ----- .
- Wired Network
- Mobile Ad-hoc Network (MANET)
- Wireless Sensor Network
- Wired Sensor Network
Question 44 : Which is not a characteristic of the wireless Channel?
- Path Loss
- Fading
- Interference
- Spectrum Allocation
Question 45 : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 46 : TCP with buffering capability and sequence information (TCP-BuS) use ABR routing scheme special messages ………….., defined as part of ABR for finding a partial path.
- Localized query (LQ)
- REPLY
- Localized query (LQ) and REPLY
- Localized query (LQ) or REPLY
Question 47 : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
- CSMA/CD
- CDMA
- CSMA/CA
- ALOHA
Question 48 : In this model, each group has a center, which is either a logical center or a group leader node.
- In-Place Mobility Model
- Overlap Mobility Model
- Reference Point Group Mobility Model
- Convention Mobility Model
Question 49 : What is defined as the change/shift in the frequency of the received signal when the transmitter and the receiver are mobile with respect to each other?
- Path Loss
- Fading
- Interference
- Doppler Shift
Question 50 : WPA uses ___________Algorithm to check integrity of the packets.
- TKIP
- SAP
- DOA
- TKP