AD HOC AND SENSOR NETWORK MCQ QUESTION
1) A wireless network without a centralized access point may be:
An infrastructure network
An ad hoc network
All of these
None of these
Answer : An ad hoc network
2) Which of the following technologies enable wireless ad-hoc networking
ZigBee
4G(LTE)
All of the above
None of these
Answer : ZigBee
3) The self-properties of self-organization networks are known by the acronym
Self-POT
Self-CHOP
Self-CHAP
Self-COAT
Answer : Self-CHOP
4) The main source of power consumption in wireless sensor networks is due to
Sensing
Transmitting
Processing
None of these
Answer : Transmitting
5) Throughput in wireless ad hoc networks with N nodes decreases at a rate of
√N
N^2
N^3
2N
Answer : √N
6) In Sprite, a selfish node may save a receipt but does not forward the message. What is the countermeasure for this selfish action?
The CCS charges the sender an extra amount of credit
The CCS gives more credit to a node that forwards a message than the node which does not The credit of each node is multiplied by a fraction r, where r < 1
The non-forwarding node is charged with an extra amount of credit
Answer : The CCS gives more credit to a node that forwards a message than the node which does not
7) The nodes which are unable to perform an operation because of either power failure or environmental events are termed as
Selfish node
Failed nodes
Dead node
Malicious node
Answer : Failed nodes
8) The types of reputations used in the CORE are
Objective, direct, and functional
Subjective, indirect, and functional
Subjective, indirect, and non-functional
Subjective, direct, and non-functional
Answer : Subjective, indirect, and functional
9) Sprite is a system based on credit, which is used to provide ___________ for mobile nodes to cooperate and report actions honestly.
Penalty
Bit coin
Incentives
Acknowledge
Answer : Incentives
10) Nodes which deliberately disrupt the correct operation of the routing protocol are known as:
Selfish nodes
Failed nodes
Badly failed nodes
Malicious nodes
Answer :Malicious nodes
1) RTS/CTS period is called
Waiting period
Contention period
Running period
None of these
Answer :Contention period
2) Existing MAC protocols cannot be used in MANETs because of --
Resource constrained nodes
Limited bandwidth
Lack of centralized control
All of the above
Answer : All of the above
3) FPRP is a –
Synchronous and contention based protocol
Asynchronous and contention based protocol
Contention based protocol without reservation mechanism
Contention based Protocols with scheduling mechanism
Answer : Synchronous and contention based protocol
4) In MACAW, Data Sending (DS) frame is of size
120 Bytes
30 Bytes
23 Byte
35 Byte
Answer : 30 Bytes
5) Which is a hybrid routing protocol:
DSR
AODV
ZRP
None of the above
Answer : ZRP
6) An example of mesh-based routing protocol is:
QAMNET
QMR
ODMRP
All the above
Answer : All the above
7) When a group of nodes are required to contact, which type of the following routing is useful?
Multicast
Unicast
Broadcast
None of these
Answer : Multicast
8) Join query and join reply are used by which of the following multicast routing protocol?
ODMRP
QAMNET QMR ZMR
QMR
ZMR
Answer : ODMRP
9) The routing scheme which use both the mask and destination address as 0.0.0.0 is:
Network-specific
Default
Host-specific
None of the above
Answer : Network-specific
10) MARCH exploits the properties of ___________ antennas and overhearing properties of MANETs.
Single directional
Bi-directional
Omnidirectional
None of these
Answer : Omnidirectional
1) In TCP-ELFN, CWND = 1 causes No significant change, because –
Optimal window is relatively small
It is similar to No change
Default value of RTO is small
All of these
Answer : Optimal window is relatively small
2) Stochastic mobility models are
Less complex
Highly diversified
Hard to realize
All of these
Answer : Less complex
3) For testing the performance of the ad-hoc network, most accurate approach is
Simulated
Analytics
Test bed
None of these
Answer :Test bed
4) Complexity is a measure of the ______________ required to produce the traces for the simulation.
Driver
Electricity
Computational resources
None of these
Answer : Computational resources
5) When ATCP encounters 3 duplicate ACKs, it puts TCP in ______________.
Active mode
Persist mode
Idle mode
Waiting mode
Answer : Persist mode
6) When ATCP is in the lossy state, reception of an ECN or ICMP message will move ATCP into which of the following state?
Free
Congested
Forward
None of these
Answer :Congested
7) After receiving 3 duplicate ACKs, following incident occurs --
ATCP puts TCP into persist mode
ATCP into loss state
ATCP into congested state
ATCP puts TCP into persist mode and ATCP into loss state
Answer :ATCP puts TCP into persist mode and ATCP into loss state
8) In TCP-F, when a routing agent detects the disruption of a route, it explicitly sends a _________ packet to the sender.
Route Failure Notification
Route Formations Notification
Route Disruption Notification
Transmission Success Notification
Answer :Route Failure Notification
9) In TCP-BuS, to avoid timeout events during the route re-construction (RRC) phase, the timeout values for buffered packets from source to PN will be
Set to one
Doubled
Same
Half
Answer : Doubled
10) ELFN works based on __________________the network (Choose most appropriate)
Selecting
Probing
Distributing
None of these
Answer :Probing
1) UAV-SDN aims to achieve –
Autonomous UAV control
Remote UAV control
Remote control and configuration of network of UAVs
Swarm of UAVs
Answer :Remote control and configuration of network of UAVs
2) What does the presence function in a time-varying graph indicate?
Whether or not a given node was present at a given location at a given time instant
Whether or not it belongs to the cut set
Characterizes a node via which all communication must pass
Whether or not a given edge was present at a given time instant
Answer :Whether or not a given edge was present at a given time instant
3) What does a Protocol Translation Unit do?
Allows two different routing protocols to communicate
Allows devices with heterogeneous MAC layers to communicate
Provides backward compatibility to older versions of a given protocol
Collects messages from highly mobile nodes similar to throwboxes
Answer :Allows two different routing protocols to communicate
4) Which is not a typical requirement for reputation/trust management schemes for OMNs, in general?
Tamper-proof hardware
Huge network bandwidth
Use of cryptographic hashes
Presence of certifying authorities
Answer :Huge network bandwidth
5) OMNs are very similar to MANETs in the sense that they both lack in network infrastructure. However, their primary difference is the lack of ____
End-to-end communication
Storage
Processing power
All of these
Answer :End-to-end communication
6) Multi-UAV systems have preferably ____________ antennas, whereas single UAV systems have omni-directional antennas.
Omni-directional
Bi-directional
Directional
None of these
Answer :Directional
7) Similar to vehicular networks, which are termed VANETs, UAV networks are popularly termed as:
UANETs
FANETs
WINETs
All of these
Answer :FANETs
8) Yaw, Pitch and Roll values are determined from which sensor?
Accelerometer
Gyroscope
Magnetometer
Barometer
Answer :Gyroscope
9) An UAV SDN implementation encompasses data and ________ planes of communication.
Process
Resource
Control
Display
Answer :Control
10) In ProPHET, the use of ___ allows to update the contact probability with a node with whom there has been no contact lately
Paging
Aging
Indexing
Casing
Answer :Aging
1) Solution for optimal coverage includes the important parameters as:
Coverage requirement
Detection time
Number of sensors
All of the above
Answer :All of the above
2) Typically, ratio between transmission range and sensing range is:
2:1
1:1
1:2
None of the above
Answer :2:1
3) Adequate placement of sensor node is important to ensure
Adequate power consumption
Adequate transmission
Adequate coverage
None of these
Answer :Adequate coverage
4) An example of coverage algorithm is
CoRD
OGDC
OMN
All of these
Answer :OGDC
5) Which of the following algorithms is known for establishing the connectivity in the presence of dumb nodes?
INTSEM
CoRD
OGDC
None of the above
Answer :CoRD
6) Which statement is false in context of the LEACH protocol?
In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication In the steady state phase, TDMA-based solutions are used for inter-cluster communication
Answer :In the steady state phase, CSMA-based solutions are used for inter-cluster communication
7) Which statement is false with respect to the EMACs protocol?
EMACs is a fully centralized algorithm
The active nodes periodically transmit short control messages
The dormant nodes are the nodes which run critically low in energy
None of the above
Answer :EMACs is a fully centralized algorithm
8) K-barrier coverage requires a barrier to be covered by:
At least k sensors
At least 1 sensors
At least 2 sensors
At least 3 sensors
Answer : At least k sensors
9) Which statement is true with respect to the LMAC protocol?
The control messages transmitted are of fixed length
LMAC ensures collision-free communication
A node may transmit either a control message or a data frame during any time slot
All of the above
Answer :All of the above
10)Which is not a variant of S-MAC?
Timeout MAC (TMAC)
Dynamic sensor MAC (DSMAC)
Input-Output MAC (IOMAC)
Data gathering (DMAC)
Answer :Input-Output MAC (IOMAC)
1. Which of the following statements does not describe the S-MAC protocol correctly?
Energy dissipation is reduced in S-MAC through idle listening
Implementation of the algorithm is simple
The sleep and listen vary constantly based on the network traffic conditions
All of the above
Answer :The sleep and listen vary constantly based on the network traffic conditions
2) Which is not a protocol of SPIN family?
SPIN-PP
SPIN-PC
SPIN-EC
SPIN-BC
Answer :SPIN-PC
3) The goal of participatory sensing is/are
Only collect data
Allow people to access data
Share knowledge
All of the above
Answer :All of the above
4) Why is implementation of MAC protocols important in context of WSNs?
Supports multi-hop communication, alongside single-hop
Special design for energy-constrained environments
Support for Ad-hoc node deployment
All of the above
Answer :All of the above
5) Which is not a cause for undesired energy wastage in WSNs?
Sensing of events
Idle listening
Overhearing in case of densely deployed sensor networks
Collision of transmitted frames
Answer :Sensing of events
6) Which of the following is the example of flat routing?
SPIN
CFFR
All of these
None of these
Answer :SPIN
7) LEACH uses dynamic _______ cycles.
CDMA
FDMA
TDMA
OFDMA
Answer :TDMA
8) Which is a negotiation based routing scheme?
Directed Diffusion
SPIN
SPEED
TTDD
Answer :SPIN
9) What is the difference between the 3-color and 4-color topdisc mechanisms?
a. 4-color topdisc mechanism does not have a cluster head node
b. Unlike the 3-color topdisc, nodes may have
red or blue color in 4-color topdisc mechanism
c. Grey color is not present in 3-color topdisc mechanism
d. Dark grey color is not present in 3-color topdisc mechanism
Answer :Dark grey color is not present in 3-color topdisc mechanismz
10) Which statement is false in context of the LEACH protocol?
In the setup phase, clusters are created and cluster heads are determined
The nodes join the cluster nearest to them with the strongest signal
In the steady state phase, CSMA-based solutions are used for inter-cluster communication
In the steady state phase, TDMA-based solutions are used for inter-cluster communication
Answer :In the steady state phase, CSMA-based solutions are used for inter-cluster communication
1)In Congestion Control, a bit can be set in a packet moving in the direction opposite to congestion in
Implicit Signaling
Backward Signaling
Source Signaling
Data Signaling
Answer :Backward Signaling
2) There is no communication between congested node or nodes and source in the
Implicit Signaling
IP Signaling
Source Signaling
Data Signaling
Answer :Implicit Signaling
3) In Congestion, formula to calculate Average Data Rate (ADR) is
Amount of Data/Stream
Amount of Data/Protocol
Amount of Data/Time
Packet
Answer :Amount of Data/Time
4) In Congestion Control and Quality of Services, our main focus is on
Data Protocol
Data Layer
Data Congestion
Data Traffic
Answer :Data Traffic
5) ________________ is the best suitable ranging technique among these? (Consider no time synchronization among nodes.)
ToA (one-way message transfer)
Euclidean distance propagation technique
ToA (two-way message transfer)
All of the above
Answer :ToA (two-way message transfer)
6) For achieving network-wide localization, which are the important parameters for evaluating any localization algorithm?
Localization coverage
Average localization accuracy
Average energy consumption
All of these
Answer :All of these
7) Underwater mobility affects
Topology
Link between nodes
Coverage
All of these
Answer :All of these
8) Which statement is true for UWSN
High spatio-temporal variability of communication channel
Less transmission power required
No memory required for data caching
None of these
Answer :High spatio-temporal variability of communication channel
9) The UWSN network could be
Star topology
Cluster topology
Mesh topology
All of these
Answer : All of these
10)No. of reference points required for localizing a node in 3D coordinate systems is ______.
4
3
5
None of these
Answer :4
1) Which of the following jamming attacks is time specific?
Constant jamming
Intermittent jamming
Deceptive jamming
Reactive jamming
Answer :Intermittent jamming
2) The primary challenges of embedded operating system are
Small memory footprint
Efficient in power and computation
Lack hardware parallelism
All of these
Answer :All of these
3) Advantages of Event-Driven Model operating system in WSN are
Concurrency with low resources
Complements the way networking protocols work
Inexpensive scheduling technique
All of these
Answer :All of these
4) Example of Event-Driven Model operating system (OS) in WSN is
Mantis OS
RETOS
TinyOS
None of these
Answer :TinyOS
5) A Bluetooth network consists of one primary device(s) and up to ____ secondary devices.
Five
Two
Seven
Nine
Answer :Seven
6) Radar is one kind of ________ sensor
Passive
Active
Dead
None of these
Answer :Active
7) One malicious node behaves like multiple nodes, this type of attack is known as
Byzantine attack
Sybil attack
DoS attack
Spoofing
Answer :Sybil attack
8) The flash memory of microcontroller in a sensor node is used to
Hold a data base
Hold a data sheet only
Hold a program code
Hold program variables only
Answer :Hold a program code
9)An example of Selective forwarding attack is:
Forwarding attack
Sinkhole attack
Selectivity attack
None of these
Answer :Sinkhole attack
10)Traditional cryptographic algorithms cannot be used directly in WSN, because sensor nodes are
Resource constrained.
Memory-less
Clock-less
Processor-less
Answer :Resource constrained.
0 Comments