Adhoc Wireless Network MCQ



Question 51 : In frequent path breaks, TCP enters a slow start phase if _________

  1. RouteRecong.<= RTO
  2. RouteRecong. RTO
  3. RouteRecong.>R TO
  

Question 52 : When too many packets are present in the subnet, and performance degrades then it leads to….

  1. Ingestion
  2. Congestion
  3. Digestion
  4. Diffusion
  

Question 53 : In TCP-ELFN, the node detecting a path break upon detection of a link failure to the TCP sender. How many ways this can be implemented ?

  1. 1
  2. 2
  3. 3
  4. 4
  

Question 54 : Which of the following protocol is a End-to-end approach of TCP over ad hoc wireless networks?

  1. Split-TCP
  2. TCP-BuS
  3. ACTP
  4. ATCP
  

Question 55 : Which of the following protocol uses a novel rate adaptation approach?

  1. Interleaved Carrier-Sense Multiple Access Protocol
  2. Receiver-Based Autorate Protocol
  3. Power Control MAC Protocol for Ad Hoc Networks
  4. Multichannel CSMAMAC Protocol
  

Question 56 : _____________is very important for bandwidth reservations by nodes.

  1. Bandwidth efficiency
  2. Quality of service support
  3. Synchronisation
  4. Hidden and ExposedTerminalProblem
  

Question 57 : WPA uses ___________Algorithm to check integrity of the packets.

  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 58 : Which packet is transmitted by omnidirectional antenna in the directional MAC scheme (DMAC-1)?

  1. RTS
  2. CTS
  3. ACK
  4. DATA
  

Question 59 : In WPA, a choice can be made between either __________ or WEP2.

  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 60 : Two known attacks on WPA are ____________ and DOS attack.

  1. Session Hijacking
  2. Dictionary Attack
  3. Rushing Attack
  4. Jamming
  

Question 61 : Location disclosure attack targets _______ Layer.

  1. Physical
  2. Transport
  3. Network
  4. Datalink
  

Question 62 : Hidden terninals are nodes that are ……

  1. configured on the network
  2. hidden from the sender of the session
  3. available with sender
  4. hidden from receiver of the session
  

Question 63 : Spoofing attack is not considered in -----------------

  1. AODV
  2. DSR
  3. ARAN
  4. ARNA
  

Question 64 : The driver is influenced by an approaching preceding vehicle and applies a normal deceleration rate to reach a safe interdistance.

  1. Approaching mode
  2. Free-driving
  3. Following mode
  4. Breaking mode
  

Question 65 : Which priority scheduling scheme uses scheduling decisions are made taking into consideration the states of neighboring nodes and the feedback from destination nodes regarding packet losses?

  1. Distributed Laxity-Based Priority Scheduling Scheme
  2. Distributed Wireless Ordering Protocol
  3. Distributed Priority Scheduling and Medium Access in Ad Hoc Networks
  4. distributed priority scheduling (DPS)
  

Question 66 : Which is not a disadvantage of using an adhoc network connection?

  1. There are too many issues (lack of security, etc.).
  2. It is good for for every day use.
  3. There are only certain situations where it would be useful.
  4. No dedicated bandwith
  

Question 67 : Which of the following protocol is a light-weight transport layer protocol?

  1. TCP-F
  2. Split-TCP
  3. Application Controlled Transport Protocol
  4. TCP-BuS
  

Question 68 : ___________ refers to the process of gaining control of the channel.

  1. BTMA
  2. MARCH
  3. Floor Acquisition
  4. MACA
  

Question 69 : Which of the following protocol is Asynchronous protocol of Contention-Based protocols with reservation Mechanism?

  1. SRMA/PA
  2. RTMAC
  3. FPRP
  4. HRMA
  

Question 70 : In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).

  1. macroscopic modeling
  2. mesoscopic modeling
  3. microscopic modeling
  4. path Modelling
  

Question 71 : TCP WITH EXPLICIT LINK FAILURE NOTIFICATION: ( TCP-ELFN) ------ .

  1. Improves TCP performance in adhoc wireless network
  2. services from network and physical layers for improving its
  3. services from network and MAC layers for improving its
  4. services from network and CSMA layers for improving its
  

Question 72 : Floor Acquisition Multiple Access Protocols (FAMA) is based on --------- .

  1. Carrier-sensing operation
  2. Bandwidth limitation
  3. Collision
  4. Hidden Channel
  

Question 73 : In this attack, a malicious node falsely advertises good paths to the destination node during the path-finding process or in the route update messages.

  1. Active Attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  

Question 74 : Which is a hybrid routing protocol?

  1. DSR
  2. AODV
  3. ZRP
  4. QMR
  

Question 75 : Cache poisoning is recognized in____ .

  1. AODV
  2. DSR
  3. ARAN
  4. ARNA
  

Question 76 : Which of the following issue is to be considered while designing a transport layer protocol for ad hoc wireless networks?

  1. Static Topology
  2. Completely decoupled transport layer
  3. Encoding
  4. Security
  

Question 77 : Which of the following protocol is Contention-Based Protocols with Scheduling Mechanisms?

  1. RI-BTMA
  2. MARCH
  3. DLPS
  4. MACA-BI
  

Question 78 : Once the TCP-ELFN sender receives the ELFN packet, enters a ________ state.

  1. Previous sender
  2. Snooze
  3. Standby
  4. Null
  

Question 79 : Symmetric-key algorithms consist of -----

  1. Block ciphers
  2. Hidden Channel
  3. RTS-CTS exchange with carrier-sensing
  4. Link Layers
  

Question 80 : Main function of Temporally ordered routing algorithm(TORA) is ------- .

  1. Establishing, maintaining, and erasing routes
  2. Efficiency, finding routes
  3. Finding location, Relocating
  4. Finding Routes
  

Question 81 : Which is not a reactive routing information update protocol?

  1. DSR
  2. AODV
  3. DSDV
  4. FORP
  

Question 82 : In TCP-F, an intermediate node, upon detection of a path break, originates a ………………

  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 83 : Which of the following model have a temporal dependency behavior?

  1. Random Walk Model
  2. Smooth Random Mobility Model
  3. The Random Waypoint Model
  4. Random Direction Model
  

Question 84 : _________protocol does not require any bandwidth reservation

  1. Contention based protocol
  2. Security based protocol
  3. Power control MAC Protocol
  4. Receiver based Autorate protocol
  

Question 85 : Which of the following is the phase of Five-Phase Reservation Protocol?

  1. End phase
  2. Collision report phase
  3. Contention phase
  4. Ready phase
  

Question 86 : TCP uses ------------- .

  1. a sliding window for flow control.
  2. high bandwith
  3. wired communication
  4. services from network and MAC layers for improving its
  

Question 87 : MARCH protocol comes under ______ .

  1. Sender-intiated Protocol
  2. Synchronous Protocol
  3. Receiverintiated Protocol
  4. Asynchronous Protocol
  

Question 88 : TCP Over AD HOC Wireless Networks ----

  1. Provides a byte stream based service
  2. Minimize overall transmission power for each connection
  3. Reduce bandwidth consumption
  4. Increases bandwidth consumption
  

Question 89 : RRTS means ---------- .

  1. Request-for- Request-toSend
  2. Repeat-Requestto-Rend
  3. ReceiveRequest-ofTrasmit-Siignal
  4. Return- Request-ofTrasmit-Siignal
  

Question 90 : Flooding-based mechanisms classified as ---- -

  1. Hybrid mechanisms
  2. Forwardingbased
  3. Disseminationbased
  4. Priority-based
  

Question 91 : In this attack, a malicious node tries to consume/waste away resources of other nodes present in the network.

  1. Resource consumption attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  

Question 92 : Major advantage of Wireless Mesh Network is -----

  1. Less physical infrastructure
  2. High scalability
  3. Wired communication
  4. Dedicated Bandwidth
  

Question 93 : Which is type of Table driven Routing Protocol?

  1. AODV
  2. CSGR
  3. STAR
  4. CSMA
  

Question 94 : Which control packets are used for transmitting best-effort packets in RTMAC protocol?

  1. RTS
  2. CTS
  3. ACK
  4. RTS, CTS and ACK
  

Question 95 : In TCP, when ATCP is in the DISCONNECTED state then --------- .

  1. remains in normal state
  2. remains in loss state
  3. remains in congested state
  4. remains in same state
  

Question 96 : Which is a proactive routing information update protocol?

  1. AODV
  2. STAR
  3. DSR
  4. FORP
  

Question 97 : ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for -------- .

  1. Detection, avoidance and control of congestion
  2. Successful delivery of the packet
  3. maximum delay
  4. provide simple feedback information
  

Question 98 : Internal attacks are from ------ .

  1. Compromised- nodes that are actually part of the network
  2. carried out by nodes that do not belong to the network
  3. carried out by nodes that belong to the network
  4. Receiver
  

Question 99 : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.

  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 100 : In ad hoc TCP (ATCP), when an intermediate node finds that the network is partitioned, then the TCP sender state is changed to the ………… state where it avoids unnecessary retransmissions.

  1. Active
  2. Persist
  3. Congestion control state
  4. Retransmit state