Adhoc Wireless Network MCQ



Question 101 : A vehicular ad hoc network (VANET) can be used ----- loads, and

  1. to alert drivers of traffic jams ahead, help balance traffic informing the
  2. balance traffic loads, and reduce traveling time by
  3. close the jam route
  4. to observe the road to maintain street safty
  

Question 102 : Which of the Following is the Issue in designing a routing protocol for Wireless Ad-Hoc Networks?

  1. Measure TCP performance
  2. Measure UDP performance
  3. Measure IP performance
  4. Measure IPV6 performance
  

Question 103 : The channel is divided into frames in ___________ .

  1. D-PRMA
  2. MARCH
  3. BTMA
  4. MACA
  

Question 104 : What is VANET stands for -------- .

  1. Vehicular AdHoc Network
  2. Vehicular Address Network
  3. Vehicular Adhoc Neural Network
  4. Wireless Sensor Networks
  

Question 105 : Which of these is not a fast fading propogation mechanisms?

  1. Reflection
  2. Diffraction
  3. Refraction
  4. Scattering
  

Question 106 : Which of the following protocol has no dedicated control channel?

  1. Multichannel MAC Protocol
  2. Interleaved Carrier-Sense Multiple Access Protocol
  3. Receiver-Based Autorate Protocol
  4. Power Control MAC Protocol for Ad Hoc Networks
  

Question 107 : Application Controlled Transport Protocol ---------

  1. Provides freedom of choosing the required choosing the required
  2. Is very compatible with TCP
  3. Is very not compatible with TCP
  4. is Less dependent on routing protocol
  

Question 108 : What type of routing is used in VANET?

  1. Single layer routing
  2. Cross Layer Routing
  3. Hybrid Routing
  4. AP Routing
  

Question 109 : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.

  1. Routing table poisoning
  2. Route cache poisoning
  3. Routing table overflow
  4. Packet replication
  

Question 110 : The wireless transmission is divided into ___________ .

  1. 3 broad groups
  2. 6 broad groups
  3. 9 broad groups
  4. 8 broad groups
  

Question 111 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?

  1. Round Trip Time
  2. Reliability
  3. Synchronization
  4. Scalability
  

Question 112 : Repudiation refers to the ------- .

  1. attempted denial by a node involved in a communication
  2. selection of node involved in a communication of having
  3. selectively dropping packets
  4. disrupt the normal operation of the network
  

Question 113 : The Random Direction mobility model was created to overcome ----- .

  1. Collision
  2. Cogestion
  3. Density Waves
  4. Interference
  

Question 114 : In TCP-F, if the link between nodes rejoins, or if any of the intermediate nodes obtains a path to destination node, a ………………. is sent to sender node.

  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Explicit link failure notification (ELFN) packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 115 : In WPA, a choice can be made between either __________ or WEP2.

  1. TKIP
  2. SAP
  3. DOA
  4. TKP
  

Question 116 : Which linear decrease is used in a multiplicative increase and linear decrease (MILD) back-off mechanism of MACAW Protocol upon a successful transmission?

  1. 1
  2. 2
  3. 3
  4. 4
  

Question 117 : Following are considered as characteristics of VANET.

  1. Static Topology
  2. Wired communication
  3. Fixed ifrastucture
  4. Mobility Modeling and Prediction
  

Question 118 : BTMA protocol comes under which mechanism?

  1. Contention Based Protocols
  2. Contentionbased protocols with reservation mechanisms
  3. MAC protocols
  4. Contentionbased protocols with scheduling
  

Question 119 : Classification of routing protocol is based on _________ .

  1. Routing information update mechanism
  2. Protocol(DSDV) Routing topology
  3. Utilization of specific resources
  4. Processing Utilization
  

Question 120 : When a TCP connection is established, the ATCP sender state is in ………. .

  1. CONGESTED
  2. LOST
  3. NORMAL
  4. DISCONN
  

Question 121 : Enhanced Distributed Channel Access (EDCA) allows ----- .

  1. Adhoc sensors
  2. Wired communication
  3. Safety messages
  4. Physical infrastrucute
  

Question 122 : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.

  1. Routing table poisoning
  2. Route cache poisoning
  3. Routing table overflow
  4. Packet replication
  

Question 123 : Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?

  1. MAC
  2. MACAW
  3. BTMA
  4. PRMA
  

Question 124 : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.

  1. WEP
  2. WPA
  3. WPA2
  4. IEEE 802.11
  

Question 125 : Which one of the following event is not possible in wireless LAN?

  1. Collision detection
  2. Acknowledgeme nt of data frames
  3. Multi-mode data transmission
  4. Connection to wired networks
  

Question 126 : Which of the following protocol is single-channel protocol of Contention-Based protocols?

  1. BTMA
  2. DBTMA
  3. MACAW
  4. RTMAC
  

Question 127 : Which of the following protocol was developed with the main objective of supporting integrated services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time maximizing the statistical multiplexing gain?

  1. Soft Reservation Multiple Access with Priority Assignment
  2. Hop Reservation Multiple Access Protocol
  3. Five-Phase Reservation Protocol
  4. MACA with Piggy-Backed Reservation
  

Question 128 : What are the components of Real-Time Medium Access Control Protocol?

  1. MAC layer protocol
  2. QoS routing protocol
  3. MAC layer protocol and QoS routing protocol
  4. MAC layer protocol or QoS routing protocol
  

Question 129 : Which of the following is the major reason behind throughput degradation that TCP faces when used in ad hoc wireless networks?

  1. Routing
  2. Symmetric link behavior
  3. Effect of path length
  4. Low bit error rate
  

Question 130 : Which one is the first protocols proposed for adhoc wireless networks?

  1. Wireless routing protocol(WRP)
  2. Destination sequenced distance-vector routing
  3. Source-tree adaptive routing protocol (STAR)
  4. Dynamic source routing protocol (DSR)
  

Question 131 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?

  1. Round Trip Time
  2. Reliability
  3. Scalability
  4. Hidden and Exposed Terminal Problems
  

Question 132 : Which of the following is the main components of MACA/PR?

  1. SMTP
  2. Reservation protocol
  3. FTP
  4. SNMP
  

Question 133 : What is the objective of a transport layer protocol?

  1. Routing
  2. Framing
  3. Encoding
  4. congestion control
  

Question 134 : When using ________there is a shared key between all the stations and access points.

  1. WPA
  2. WEP
  3. ICV
  4. SSID
  

Question 135 : In AODV routing algorithm for MANETs, the route is discovered at time …

  1. Only when the network is established
  2. In middle of the transmission
  3. When there is a need for route by the host
  4. When there is no need for route by the host
  

Question 136 : Two known attacks on WPA are ____________ and DOS attack.

  1. Session Hijacking
  2. Dictionary Attack
  3. Rushing Attack
  4. Jamming
  

Question 137 : A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.

  1. MAN
  2. WAN
  3. LAN
  4. None of these
  

Question 138 : TCP-F provides a simple feedback-based solution to ….. the problems arising out of frequent path breaks in ad hoc wireless networks.

  1. Maximize
  2. Minimize
  3. Max
  4. Min
  

Question 139 : Which of the following is the main components of MACA/PR?

  1. FTP
  2. SNMP
  3. QoS routing protocol
  4. SMTP
  

Question 140 : In this type of attack, an adversary attempts to prevent consume/waste away resources of other nodes present in the network.

  1. Resource consumption attack
  2. Blackhole Attack
  3. Denial of Service Attack
  4. Wormhole attack
  

Question 141 : In wireless ad-hoc network ____

  1. Access point is must
  2. Access point is not required
  3. Nodes are not required
  4. All nodes are access points
  

Question 142 : The basic idea of the aggregation scheme is based on so-called landmarks.

  1. Judging the quality of information
  2. Landmarkbased aggregation
  3. Hierarchical landmark aggregation
  4. Wired landmark
  

Question 143 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?

  1. Round Trip Time
  2. Reliability
  3. Error-Prone Shared Broadcast Channel
  4. Scalability
  

Question 144 : In TCP-ELFN, for detecting the new route reestablishment TCP ……. Packets are used.

  1. Route failure notification (RFN) packet
  2. Route reestablishment notification (RRN) packet
  3. Probe packet
  4. Explicit route successful notification (ERSN) packet.
  

Question 145 : In RI-BTMA the data packets are divided into two portions a _________ and actual data packets.

  1. Asynchronous
  2. Synchronous
  3. Preamble
  4. Free
  

Question 146 : Mostly ________ is used in wireless LAN.

  1. Space division multiplexing
  2. Channel division multiplexing
  3. Orthogonal frequency division multiplexing
  4. Time division multiplexing
  

Question 147 : How attacks against ad hoc wireless networks are generally classified into?

  1. Passive and active attacks
  2. Active attacks
  3. Passive attacks
  4. Passive or active attacks
  

Question 148 : VANET refers for ------ .

  1. Inter vehicuar communication
  2. Communication between devices
  3. Communication between Aps
  4. Communication between Wired Network
  

Question 149 : Hybrid Routing attempts to …..........

  1. discover route only when you need it
  2. Saves energy and bandwidth during inactivity
  3. Be Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group)
  4. Organize Nodes in clusters
  

Question 150 : Delay-Tolerant Routing is used in ----

  1. Delivering advertisements
  2. Sensing element
  3. Path finding
  4. Information Processing
  

Question 151 : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.

  1. WEP
  2. WPA
  3. WPA2
  4. IEEE 802.11
  

Question 152 : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the

  1. Blackhole attack
  2. Wormhole attack
  3. Byzantine attack
  4. Information disclosure
  

Question 153 : When using ________there is a shared key between all the stations and access points.

  1. WPA
  2. WEP
  3. ICV
  4. SSID
  

Question 154 : In distance vector routing algorithm, the routing tables are updated …..

  1. By exchanging information with the neighbors
  2. Automatically
  3. Using the Backup database
  4. By the Server
  

Question 155 : Which of the following is not a advantage of Split-TCP?

  1. Improved throughput
  2. Improved throughput fairness
  3. lessened impact of mobility
  4. It requires modifications to TCP protocol