Question 51 : In frequent path breaks, TCP enters a slow start phase if _________
- RouteRecong.<= RTO
- RouteRecong. RTO
- RouteRecong.>R TO
Question 52 : When too many packets are present in the subnet, and performance degrades then it leads to….
- Ingestion
- Congestion
- Digestion
- Diffusion
Question 53 : In TCP-ELFN, the node detecting a path break upon detection of a link failure to the TCP sender. How many ways this can be implemented ?
- 1
- 2
- 3
- 4
Question 54 : Which of the following protocol is a End-to-end approach of TCP over ad hoc wireless networks?
- Split-TCP
- TCP-BuS
- ACTP
- ATCP
Question 55 : Which of the following protocol uses a novel rate adaptation approach?
- Interleaved Carrier-Sense Multiple Access Protocol
- Receiver-Based Autorate Protocol
- Power Control MAC Protocol for Ad Hoc Networks
- Multichannel CSMAMAC Protocol
Question 56 : _____________is very important for bandwidth reservations by nodes.
- Bandwidth efficiency
- Quality of service support
- Synchronisation
- Hidden and ExposedTerminalProblem
Question 57 : WPA uses ___________Algorithm to check integrity of the packets.
- TKIP
- SAP
- DOA
- TKP
Question 58 : Which packet is transmitted by omnidirectional antenna in the directional MAC scheme (DMAC-1)?
- RTS
- CTS
- ACK
- DATA
Question 59 : In WPA, a choice can be made between either __________ or WEP2.
- TKIP
- SAP
- DOA
- TKP
Question 60 : Two known attacks on WPA are ____________ and DOS attack.
- Session Hijacking
- Dictionary Attack
- Rushing Attack
- Jamming
Question 61 : Location disclosure attack targets _______ Layer.
- Physical
- Transport
- Network
- Datalink
Question 62 : Hidden terninals are nodes that are ……
- configured on the network
- hidden from the sender of the session
- available with sender
- hidden from receiver of the session
Question 63 : Spoofing attack is not considered in -----------------
- AODV
- DSR
- ARAN
- ARNA
Question 64 : The driver is influenced by an approaching preceding vehicle and applies a normal deceleration rate to reach a safe interdistance.
- Approaching mode
- Free-driving
- Following mode
- Breaking mode
Question 65 : Which priority scheduling scheme uses scheduling decisions are made taking into consideration the states of neighboring nodes and the feedback from destination nodes regarding packet losses?
- Distributed Laxity-Based Priority Scheduling Scheme
- Distributed Wireless Ordering Protocol
- Distributed Priority Scheduling and Medium Access in Ad Hoc Networks
- distributed priority scheduling (DPS)
Question 66 : Which is not a disadvantage of using an adhoc network connection?
- There are too many issues (lack of security, etc.).
- It is good for for every day use.
- There are only certain situations where it would be useful.
- No dedicated bandwith
Question 67 : Which of the following protocol is a light-weight transport layer protocol?
- TCP-F
- Split-TCP
- Application Controlled Transport Protocol
- TCP-BuS
Question 68 : ___________ refers to the process of gaining control of the channel.
- BTMA
- MARCH
- Floor Acquisition
- MACA
Question 69 : Which of the following protocol is Asynchronous protocol of Contention-Based protocols with reservation Mechanism?
- SRMA/PA
- RTMAC
- FPRP
- HRMA
Question 70 : In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).
- macroscopic modeling
- mesoscopic modeling
- microscopic modeling
- path Modelling
Question 71 : TCP WITH EXPLICIT LINK FAILURE NOTIFICATION: ( TCP-ELFN) ------ .
- Improves TCP performance in adhoc wireless network
- services from network and physical layers for improving its
- services from network and MAC layers for improving its
- services from network and CSMA layers for improving its
Question 72 : Floor Acquisition Multiple Access Protocols (FAMA) is based on --------- .
- Carrier-sensing operation
- Bandwidth limitation
- Collision
- Hidden Channel
Question 73 : In this attack, a malicious node falsely advertises good paths to the destination node during the path-finding process or in the route update messages.
- Active Attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack
Question 74 : Which is a hybrid routing protocol?
- DSR
- AODV
- ZRP
- QMR
Question 75 : Cache poisoning is recognized in____ .
- AODV
- DSR
- ARAN
- ARNA
Question 76 : Which of the following issue is to be considered while designing a transport layer protocol for ad hoc wireless networks?
- Static Topology
- Completely decoupled transport layer
- Encoding
- Security
Question 77 : Which of the following protocol is Contention-Based Protocols with Scheduling Mechanisms?
- RI-BTMA
- MARCH
- DLPS
- MACA-BI
Question 78 : Once the TCP-ELFN sender receives the ELFN packet, enters a ________ state.
- Previous sender
- Snooze
- Standby
- Null
Question 79 : Symmetric-key algorithms consist of -----
- Block ciphers
- Hidden Channel
- RTS-CTS exchange with carrier-sensing
- Link Layers
Question 80 : Main function of Temporally ordered routing algorithm(TORA) is ------- .
- Establishing, maintaining, and erasing routes
- Efficiency, finding routes
- Finding location, Relocating
- Finding Routes
Question 81 : Which is not a reactive routing information update protocol?
- DSR
- AODV
- DSDV
- FORP
Question 82 : In TCP-F, an intermediate node, upon detection of a path break, originates a ………………
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 83 : Which of the following model have a temporal dependency behavior?
- Random Walk Model
- Smooth Random Mobility Model
- The Random Waypoint Model
- Random Direction Model
Question 84 : _________protocol does not require any bandwidth reservation
- Contention based protocol
- Security based protocol
- Power control MAC Protocol
- Receiver based Autorate protocol
Question 85 : Which of the following is the phase of Five-Phase Reservation Protocol?
- End phase
- Collision report phase
- Contention phase
- Ready phase
Question 86 : TCP uses ------------- .
- a sliding window for flow control.
- high bandwith
- wired communication
- services from network and MAC layers for improving its
Question 87 : MARCH protocol comes under ______ .
- Sender-intiated Protocol
- Synchronous Protocol
- Receiverintiated Protocol
- Asynchronous Protocol
Question 88 : TCP Over AD HOC Wireless Networks ----
- Provides a byte stream based service
- Minimize overall transmission power for each connection
- Reduce bandwidth consumption
- Increases bandwidth consumption
Question 89 : RRTS means ---------- .
- Request-for- Request-toSend
- Repeat-Requestto-Rend
- ReceiveRequest-ofTrasmit-Siignal
- Return- Request-ofTrasmit-Siignal
Question 90 : Flooding-based mechanisms classified as ---- -
- Hybrid mechanisms
- Forwardingbased
- Disseminationbased
- Priority-based
Question 91 : In this attack, a malicious node tries to consume/waste away resources of other nodes present in the network.
- Resource consumption attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack
Question 92 : Major advantage of Wireless Mesh Network is -----
- Less physical infrastructure
- High scalability
- Wired communication
- Dedicated Bandwidth
Question 93 : Which is type of Table driven Routing Protocol?
- AODV
- CSGR
- STAR
- CSMA
Question 94 : Which control packets are used for transmitting best-effort packets in RTMAC protocol?
- RTS
- CTS
- ACK
- RTS, CTS and ACK
Question 95 : In TCP, when ATCP is in the DISCONNECTED state then --------- .
- remains in normal state
- remains in loss state
- remains in congested state
- remains in same state
Question 96 : Which is a proactive routing information update protocol?
- AODV
- STAR
- DSR
- FORP
Question 97 : ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for -------- .
- Detection, avoidance and control of congestion
- Successful delivery of the packet
- maximum delay
- provide simple feedback information
Question 98 : Internal attacks are from ------ .
- Compromised- nodes that are actually part of the network
- carried out by nodes that do not belong to the network
- carried out by nodes that belong to the network
- Receiver
Question 99 : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 100 : In ad hoc TCP (ATCP), when an intermediate node finds that the network is partitioned, then the TCP sender state is changed to the ………… state where it avoids unnecessary retransmissions.
- Active
- Persist
- Congestion control state
- Retransmit state