Question 101 : A vehicular ad hoc network (VANET) can be used ----- loads, and
- to alert drivers of traffic jams ahead, help balance traffic informing the
- balance traffic loads, and reduce traveling time by
- close the jam route
- to observe the road to maintain street safty
Question 102 : Which of the Following is the Issue in designing a routing protocol for Wireless Ad-Hoc Networks?
- Measure TCP performance
- Measure UDP performance
- Measure IP performance
- Measure IPV6 performance
Question 103 : The channel is divided into frames in ___________ .
- D-PRMA
- MARCH
- BTMA
- MACA
Question 104 : What is VANET stands for -------- .
- Vehicular AdHoc Network
- Vehicular Address Network
- Vehicular Adhoc Neural Network
- Wireless Sensor Networks
Question 105 : Which of these is not a fast fading propogation mechanisms?
- Reflection
- Diffraction
- Refraction
- Scattering
Question 106 : Which of the following protocol has no dedicated control channel?
- Multichannel MAC Protocol
- Interleaved Carrier-Sense Multiple Access Protocol
- Receiver-Based Autorate Protocol
- Power Control MAC Protocol for Ad Hoc Networks
Question 107 : Application Controlled Transport Protocol ---------
- Provides freedom of choosing the required choosing the required
- Is very compatible with TCP
- Is very not compatible with TCP
- is Less dependent on routing protocol
Question 108 : What type of routing is used in VANET?
- Single layer routing
- Cross Layer Routing
- Hybrid Routing
- AP Routing
Question 109 : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.
- Routing table poisoning
- Route cache poisoning
- Routing table overflow
- Packet replication
Question 110 : The wireless transmission is divided into ___________ .
- 3 broad groups
- 6 broad groups
- 9 broad groups
- 8 broad groups
Question 111 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Synchronization
- Scalability
Question 112 : Repudiation refers to the ------- .
- attempted denial by a node involved in a communication
- selection of node involved in a communication of having
- selectively dropping packets
- disrupt the normal operation of the network
Question 113 : The Random Direction mobility model was created to overcome ----- .
- Collision
- Cogestion
- Density Waves
- Interference
Question 114 : In TCP-F, if the link between nodes rejoins, or if any of the intermediate nodes obtains a path to destination node, a ………………. is sent to sender node.
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Explicit link failure notification (ELFN) packet
- Explicit route successful notification (ERSN) packet.
Question 115 : In WPA, a choice can be made between either __________ or WEP2.
- TKIP
- SAP
- DOA
- TKP
Question 116 : Which linear decrease is used in a multiplicative increase and linear decrease (MILD) back-off mechanism of MACAW Protocol upon a successful transmission?
- 1
- 2
- 3
- 4
Question 117 : Following are considered as characteristics of VANET.
- Static Topology
- Wired communication
- Fixed ifrastucture
- Mobility Modeling and Prediction
Question 118 : BTMA protocol comes under which mechanism?
- Contention Based Protocols
- Contentionbased protocols with reservation mechanisms
- MAC protocols
- Contentionbased protocols with scheduling
Question 119 : Classification of routing protocol is based on _________ .
- Routing information update mechanism
- Protocol(DSDV) Routing topology
- Utilization of specific resources
- Processing Utilization
Question 120 : When a TCP connection is established, the ATCP sender state is in ………. .
- CONGESTED
- LOST
- NORMAL
- DISCONN
Question 121 : Enhanced Distributed Channel Access (EDCA) allows ----- .
- Adhoc sensors
- Wired communication
- Safety messages
- Physical infrastrucute
Question 122 : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.
- Routing table poisoning
- Route cache poisoning
- Routing table overflow
- Packet replication
Question 123 : Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?
- MAC
- MACAW
- BTMA
- PRMA
Question 124 : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.
- WEP
- WPA
- WPA2
- IEEE 802.11
Question 125 : Which one of the following event is not possible in wireless LAN?
- Collision detection
- Acknowledgeme nt of data frames
- Multi-mode data transmission
- Connection to wired networks
Question 126 : Which of the following protocol is single-channel protocol of Contention-Based protocols?
- BTMA
- DBTMA
- MACAW
- RTMAC
Question 127 : Which of the following protocol was developed with the main objective of supporting integrated services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time maximizing the statistical multiplexing gain?
- Soft Reservation Multiple Access with Priority Assignment
- Hop Reservation Multiple Access Protocol
- Five-Phase Reservation Protocol
- MACA with Piggy-Backed Reservation
Question 128 : What are the components of Real-Time Medium Access Control Protocol?
- MAC layer protocol
- QoS routing protocol
- MAC layer protocol and QoS routing protocol
- MAC layer protocol or QoS routing protocol
Question 129 : Which of the following is the major reason behind throughput degradation that TCP faces when used in ad hoc wireless networks?
- Routing
- Symmetric link behavior
- Effect of path length
- Low bit error rate
Question 130 : Which one is the first protocols proposed for adhoc wireless networks?
- Wireless routing protocol(WRP)
- Destination sequenced distance-vector routing
- Source-tree adaptive routing protocol (STAR)
- Dynamic source routing protocol (DSR)
Question 131 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Scalability
- Hidden and Exposed Terminal Problems
Question 132 : Which of the following is the main components of MACA/PR?
- SMTP
- Reservation protocol
- FTP
- SNMP
Question 133 : What is the objective of a transport layer protocol?
- Routing
- Framing
- Encoding
- congestion control
Question 134 : When using ________there is a shared key between all the stations and access points.
- WPA
- WEP
- ICV
- SSID
Question 135 : In AODV routing algorithm for MANETs, the route is discovered at time …
- Only when the network is established
- In middle of the transmission
- When there is a need for route by the host
- When there is no need for route by the host
Question 136 : Two known attacks on WPA are ____________ and DOS attack.
- Session Hijacking
- Dictionary Attack
- Rushing Attack
- Jamming
Question 137 : A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.
- MAN
- WAN
- LAN
- None of these
Question 138 : TCP-F provides a simple feedback-based solution to ….. the problems arising out of frequent path breaks in ad hoc wireless networks.
- Maximize
- Minimize
- Max
- Min
Question 139 : Which of the following is the main components of MACA/PR?
- FTP
- SNMP
- QoS routing protocol
- SMTP
Question 140 : In this type of attack, an adversary attempts to prevent consume/waste away resources of other nodes present in the network.
- Resource consumption attack
- Blackhole Attack
- Denial of Service Attack
- Wormhole attack
Question 141 : In wireless ad-hoc network ____
- Access point is must
- Access point is not required
- Nodes are not required
- All nodes are access points
Question 142 : The basic idea of the aggregation scheme is based on so-called landmarks.
- Judging the quality of information
- Landmarkbased aggregation
- Hierarchical landmark aggregation
- Wired landmark
Question 143 : Which of the following is the main issue that need to be addressed while designing a MAC protocol for ad hoc wireless networks?
- Round Trip Time
- Reliability
- Error-Prone Shared Broadcast Channel
- Scalability
Question 144 : In TCP-ELFN, for detecting the new route reestablishment TCP ……. Packets are used.
- Route failure notification (RFN) packet
- Route reestablishment notification (RRN) packet
- Probe packet
- Explicit route successful notification (ERSN) packet.
Question 145 : In RI-BTMA the data packets are divided into two portions a _________ and actual data packets.
- Asynchronous
- Synchronous
- Preamble
- Free
Question 146 : Mostly ________ is used in wireless LAN.
- Space division multiplexing
- Channel division multiplexing
- Orthogonal frequency division multiplexing
- Time division multiplexing
Question 147 : How attacks against ad hoc wireless networks are generally classified into?
- Passive and active attacks
- Active attacks
- Passive attacks
- Passive or active attacks
Question 148 : VANET refers for ------ .
- Inter vehicuar communication
- Communication between devices
- Communication between Aps
- Communication between Wired Network
Question 149 : Hybrid Routing attempts to …..........
- discover route only when you need it
- Saves energy and bandwidth during inactivity
- Be Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group)
- Organize Nodes in clusters
Question 150 : Delay-Tolerant Routing is used in ----
- Delivering advertisements
- Sensing element
- Path finding
- Information Processing
Question 151 : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.
- WEP
- WPA
- WPA2
- IEEE 802.11
Question 152 : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the
- Blackhole attack
- Wormhole attack
- Byzantine attack
- Information disclosure
Question 153 : When using ________there is a shared key between all the stations and access points.
- WPA
- WEP
- ICV
- SSID
Question 154 : In distance vector routing algorithm, the routing tables are updated …..
- By exchanging information with the neighbors
- Automatically
- Using the Backup database
- By the Server
Question 155 : Which of the following is not a advantage of Split-TCP?
- Improved throughput
- Improved throughput fairness
- lessened impact of mobility
- It requires modifications to TCP protocol