Adhoc Wireless Network MCQ



Question 1 : Which of the following is not a responsibility of a routing protocol in wireless ad hoc Networks?

  1. Exchanging the route information
  2. Gathering information about the path breaks
  3. Mending the broken paths expending minimum processing power and bandwidth
  4. Utilizing maximum bandwidth
  

Question 2 : For forwarding data packet from one node to another following protocol in VANET can be used --------- .

  1. Delay Tolerant Network
  2. TCP/IP
  3. UDP
  4. IP
  

Question 3 : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.

  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 4 : What can be expressed as the ratio of the power of the transmitted signal to the power of the same signal received by the receiver, on a given path?

  1. Path Loss
  2. Fading
  3. Interference
  4. Doppler Shift
  

Question 5 : In Security Aware AODV Protocol ------ .

  1. the route discovery process is initiated by
  2. the route discovery process is initiated by sending RTS
  3. the route discovery process is initiated by
  4. the route discovery process is initiated by
  

Question 6 : The network in which all the nodes are symmetric and there is no central control or hierarchy is ……

  1. MANET
  2. Client-Server Technology
  3. Peer-to-Peer
  4. VANET
  

Question 7 : Wormhole Attack ------ .

  1. Receives packets at one location in the network
  2. creates routing loops
  3. selectively dropping packets
  4. may leak confidential information to unauthorized-
  

Question 8 : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.

  1. Passive Atttack
  2. Active Attack
  3. Snooping
  4. Jamming
  

Question 9 : In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………

  1. Route failure notification (RFN) packet
  2. Explicit route disconnection notification (ERDN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 10 : In which protocol probability of colliision is very low but bandwidth utilization is very poor?

  1. BTMA
  2. FAMA
  3. MARCH
  4. PRMA
  

Question 11 : In this ________ attack, an adversary node replicates stale packets.

  1. Routing table poisoning
  2. Route cache poisoning
  3. Packet replication
  4. Routing table overflow
  

Question 12 : Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless network?

  1. Distributed arbitration for the shared channel for transmission of packets
  2. Quality of Service
  3. Throughput
  4. Routing
  

Question 13 : The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.

  1. FAMA
  2. BTMA
  3. MACA
  4. MACAW
  

Question 14 : Ad-hoc network connects each computer using which network topology?

  1. Three
  2. Mesh
  3. Star
  4. Bus
  

Question 15 : What is the first step toward a QoS-aware routing protocol ?

  1. Transmitting a packet
  2. Finding the path
  3. Round trip time
  4. Reliability
  

Question 16 : In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?

  1. BTMA
  2. FAMA
  3. MARCH
  4. PRMA
  

Question 17 : Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?

  1. Proactive Routing Protocol
  2. Hybrid Routing Protocol
  3. Power Aware Routing Protocol
  4. Reactive Routing Protocol
  

Question 18 : IEEE 802.2: specifies……

  1. the Logical Link Control (LLC)
  2. the Phisical Link Control (PLC)
  3. OSI Layers
  4. the Route Link Control (RLC)
  

Question 19 : In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.

  1. Source id
  2. Sequence number
  3. Destination id
  4. Receiver id
  

Question 20 : In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the availability of a partial path to destination is intimated to theTCP-BuS sender through an ……

  1. Route failure notification (RFN) packet
  2. Explicit route disconnection notification (ERDN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 21 : The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.

  1. Column Mobility Model
  2. Overlap Mobility Model
  3. In-Place Mobility Model
  4. Reference Point Group Mobility Model
  

Question 22 : Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced services,high scalability, easy extensibility, high availability & low cost per bit.

  1. Military applications
  2. Emergency Operation
  3. Wireless Sensor Network
  4. Wireless Mesh Network
  

Question 23 : Which antennas are used for transmitting the signals in the directional MAC scheme (DMAC-2)?

  1. Directional antennas
  2. Omnidirectional antennas
  3. Directional antennas and Omnidirectional antennas
  4. Directional antennas or Omnidirectional antennas
  

Question 24 : Communication in vehicular environment are provided by ----- .

  1. using a OSI Model
  2. using a wireless medium 802.11p which is based out of 802.11 standard
  3. Satellite communication
  4. using a wireless medium 820.11p which is based out of
  

Question 25 : What does ATP stand for?

  1. Ad Hoc Transport Protocol
  2. Ad Transfer Protocol
  3. Ad Hoc Transmission Protocol
  4. Ad Hoc Transfer Protocol
  

Question 26 : Which of the following protocol is Receiver-Initiated protocol of Contention-Based protocols?

  1. DLPS
  2. DWOP
  3. DPS
  4. MARCH
  

Question 27 : The objectives of transport layer protocol include:

  1. Bandwidth allocation
  2. end-to-end delivery of data packets
  3. Path finding
  4. Speed of transmission
  

Question 28 : One advantage that DSR has over DSDV due to its on-demand nature.

  1. New link is generated
  2. Routing adapts to load
  3. Sequence number is updated
  4. No New link is generated
  

Question 29 : Which of the following protocol does not require global synchronization among nodes?

  1. RTMAC
  2. MACA/PR
  3. MAC
  4. RT
  

Question 30 : Wireless routing protocol is an example of _____________ .

  1. Proactive routing protocol
  2. Reactive routing protocol
  3. Hybrid routing protocol
  4. Source initiated Routing Protocol
  

Question 31 : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.

  1. Passive Atttack
  2. Active Attack
  3. Snooping
  4. Jamming
  

Question 32 : Which of the following protocol eliminates the need for the RTS packet?

  1. Media Access with Reduced Handshake
  2. MACA-By Invitation
  3. Receiver-Initiated Busy Tone Multiple Access Protocol
  4. Dual Busy Tone Multiple Access Protocol
  

Question 33 : Classification of MAC Protocol consist of ___ .

  1. Contention based protocol
  2. Security based protocol
  3. Power control MAC Protocol
  4. Receiver based Autorate protocol
  

Question 34 : The attack effected by making the network resource unavailable for service to other nodes, either by consuming the bandwidth or by overloading the system, is known as …..

  1. Denial of service
  2. Host impersonation
  3. Information disclosure
  4. Interference
  

Question 35 : Which is TCP protocol cannot be used for the issue of "Dependency on routing protocol "?

  1. TCP-ELFN
  2. TCP-F
  3. SPLIT TCP
  4. TCP-BUS
  

Question 36 : The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.

  1. "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"
  2. "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless network "
  3. "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "
  4. "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the impending DATA packets"
  

Question 37 : In this ________ attack, an adversary node replicates stale packets.

  1. Routing table poisoning
  2. Route cache poisoning
  3. Packet replication
  4. Routing table overflow
  

Question 38 : Wireless access in vehicular environments (WAVE)is a ------ .

  1. Network
  2. Protocol
  3. Sensor
  4. Hub
  

Question 39 : Denial of Service attack targets _______ Layer.

  1. Physical
  2. Multi
  3. Network
  4. Datalink
  

Question 40 : Which of the following protocol is based on a channel access discipline which consists of a carrier-sensing operation and a collision-avoidance dialog between the sender and the intended receiver of a packet?

  1. Media Access with Reduced Handshake
  2. Floor Acquisition Multiple Access Protocols
  3. MACA-By Invitation
  4. Busy Tone Multiple Access Protocols
  

Question 41 : In TCP-F, when a TCP sender receives an RFN packet, it goes into a state called …..

  1. Connected
  2. Snooze
  3. Standby
  4. Active
  

Question 42 : Which of the following criteria is used to categories MAC protocols for ad hoc wireless networks?

  1. Round Trip Time
  2. Reliability
  3. Reservation approaches
  4. Broadcast Channel
  

Question 43 : Vehicular adhoc network (VANET) is a tupr of ----- .

  1. Wired Network
  2. Mobile Ad-hoc Network (MANET)
  3. Wireless Sensor Network
  4. Wired Sensor Network
  

Question 44 : Which is not a characteristic of the wireless Channel?

  1. Path Loss
  2. Fading
  3. Interference
  4. Spectrum Allocation
  

Question 45 : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the

  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 46 : TCP with buffering capability and sequence information (TCP-BuS) use ABR routing scheme special messages ………….., defined as part of ABR for finding a partial path.

  1. Localized query (LQ)
  2. REPLY
  3. Localized query (LQ) and REPLY
  4. Localized query (LQ) or REPLY
  

Question 47 : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

  1. CSMA/CD
  2. CDMA
  3. CSMA/CA
  4. ALOHA
  

Question 48 : In this model, each group has a center, which is either a logical center or a group leader node.

  1. In-Place Mobility Model
  2. Overlap Mobility Model
  3. Reference Point Group Mobility Model
  4. Convention Mobility Model
  

Question 49 : What is defined as the change/shift in the frequency of the received signal when the transmitter and the receiver are mobile with respect to each other?

  1. Path Loss
  2. Fading
  3. Interference
  4. Doppler Shift
  

Question 50 : WPA uses ___________Algorithm to check integrity of the packets.

  1. TKIP
  2. SAP
  3. DOA
  4. TKP