Header Ads

AD HOC AND SENSOR NETWORK MCQ QUESTION 4

AD HOC AND SENSOR NETWORK MCQ QUESTION

1) A wireless network without a centralized access point may be: 

 An infrastructure network 

 An ad hoc network 

 All of these 

 None of these 

Answer : An ad hoc network 

2) Which of the following technologies enable wireless ad-hoc networking 

 ZigBee 

 4G(LTE) 

 All of the above 

 None of these 

 Answer : ZigBee 

3) The self-properties of self-organization networks are known by the acronym 

 Self-POT 

 Self-CHOP 

 Self-CHAP 

 Self-COAT 

 Answer : Self-CHOP 

4) The main source of power consumption in wireless sensor networks is due to 

 Sensing 

 Transmitting 

 Processing 

 None of these 

Answer : Transmitting 

5) Throughput in wireless ad hoc networks with N nodes decreases at a rate of 

√N 

N^2 

N^3 

2N 

 Answer : √N 

6) In Sprite, a selfish node may save a receipt but does not forward the message. What is the countermeasure for this selfish action? 

 The CCS charges the sender an extra amount of credit 

 The CCS gives more credit to a node that forwards a message than the node which does not  The credit of each node is multiplied by a fraction r, where r < 1 

 The non-forwarding node is charged with an extra amount of credit 

 Answer : The CCS gives more credit to a node that forwards a message than the node which does not

7) The nodes which are unable to perform an operation because of either power failure or environmental events are termed as 

 Selfish node 

 Failed nodes 

 Dead node 

 Malicious node 

 Answer : Failed nodes 

8) The types of reputations used in the CORE are 

 Objective, direct, and functional 

 Subjective, indirect, and functional 

 Subjective, indirect, and non-functional 

 Subjective, direct, and non-functional 

 Answer : Subjective, indirect, and functional 

9) Sprite is a system based on credit, which is used to provide ___________ for mobile nodes to cooperate and report actions honestly. 

 Penalty 

 Bit coin 

 Incentives 

 Acknowledge 

 Answer : Incentives 

10) Nodes which deliberately disrupt the correct operation of the routing protocol are known as: 

 Selfish nodes 

Failed nodes 

 Badly failed nodes 

 Malicious nodes 

Answer :Malicious nodes 


1) RTS/CTS period is called 

 Waiting period 

 Contention period 

 Running period 

 None of these 

Answer :Contention period 

2) Existing MAC protocols cannot be used in MANETs because of -- 

 Resource constrained nodes 

 Limited bandwidth 

 Lack of centralized control 

 All of the above 

 Answer : All of the above 

3) FPRP is a – 

 Synchronous and contention based protocol 

 Asynchronous and contention based protocol 

 Contention based protocol without reservation mechanism 

 Contention based Protocols with scheduling mechanism 

 Answer : Synchronous and contention based protocol 

4) In MACAW, Data Sending (DS) frame is of size 

 120 Bytes 

 30 Bytes 

 23 Byte 

 35 Byte

 Answer : 30 Bytes 

5) Which is a hybrid routing protocol: 

 DSR 

 AODV 

 ZRP 

 None of the above 

Answer :  ZRP 

6) An example of mesh-based routing protocol is: 

 QAMNET 

 QMR 

 ODMRP 

 All the above 

Answer :  All the above 

7) When a group of nodes are required to contact, which type of the following routing is useful? 

 Multicast 

 Unicast 

 Broadcast 

 None of these 

 Answer : Multicast 

8) Join query and join reply are used by which of the following multicast routing protocol? 

 ODMRP 

 QAMNET QMR ZMR 

 QMR 

 ZMR 

 Answer : ODMRP 

9) The routing scheme which use both the mask and destination address as 0.0.0.0 is: 

 Network-specific 

 Default 

 Host-specific 

 None of the above 

 Answer : Network-specific 

10) MARCH exploits the properties of ___________ antennas and overhearing properties of MANETs. 

 Single directional 

 Bi-directional 

Omnidirectional 

None of these 

Answer : Omnidirectional 


1) In TCP-ELFN, CWND = 1 causes No significant change, because – 

 Optimal window is relatively small 

 It is similar to No change 

 Default value of RTO is small 

 All of these 

Answer : Optimal window is relatively small 

2) Stochastic mobility models are 

 Less complex 

 Highly diversified 

 Hard to realize 

 All of these 

Answer : Less complex 

3) For testing the performance of the ad-hoc network, most accurate approach is 

 Simulated 

 Analytics 

 Test bed 

 None of these 

Answer :Test bed 

4) Complexity is a measure of the ______________ required to produce the traces for the simulation. 

 Driver 

 Electricity 

 Computational resources 

 None of these 

Answer : Computational resources 


5) When ATCP encounters 3 duplicate ACKs, it puts TCP in ______________. 

Active mode 

Persist mode 

 Idle mode 

Waiting mode 

Answer : Persist mode 


6) When ATCP is in the lossy state, reception of an ECN or ICMP message will move ATCP into which of the following state? 

 Free 

Congested 

Forward 

None of these 

Answer :Congested 


7) After receiving 3 duplicate ACKs, following incident occurs --

ATCP puts TCP into persist mode 

ATCP into loss state 

ATCP into congested state 

ATCP puts TCP into persist mode and ATCP into loss state 

Answer :ATCP puts TCP into persist mode and ATCP into loss state


8) In TCP-F, when a routing agent detects the disruption of a route, it explicitly sends a _________ packet to the sender. 

Route Failure Notification 

 Route Formations Notification 

 Route Disruption Notification 

Transmission Success Notification 

Answer :Route Failure Notification 


9)  In TCP-BuS, to avoid timeout events during the route re-construction (RRC) phase, the timeout values for buffered packets from source to PN will be 

 Set to one 

Doubled 

Same 

Half 

Answer : Doubled 


10) ELFN works based on __________________the network (Choose most appropriate) 

Selecting 

Probing 

Distributing 

None of these 

Answer :Probing 


1) UAV-SDN aims to achieve – 

 Autonomous UAV control 

 Remote UAV control 

 Remote control and configuration of network of UAVs 

 Swarm of UAVs 

Answer :Remote control and configuration of network of UAVs 

2) What does the presence function in a time-varying graph indicate? 

 Whether or not a given node was present at a given location at a given time instant 

Whether or not it belongs to the cut set 

 Characterizes a node via which all communication must pass 

 Whether or not a given edge was present at a given time instant 


Answer :Whether or not a given edge was present at a given time instant 

3) What does a Protocol Translation Unit do? 

 Allows two different routing protocols to communicate 

 Allows devices with heterogeneous MAC layers to communicate 

 Provides backward compatibility to older versions of a given protocol 

 Collects messages from highly mobile nodes similar to throwboxes 

Answer :Allows two different routing protocols to communicate 

4) Which is not a typical requirement for reputation/trust management schemes for OMNs, in general? 

 Tamper-proof hardware 

 Huge network bandwidth 

 Use of cryptographic hashes 

 Presence of certifying authorities 

Answer :Huge network bandwidth 

5) OMNs are very similar to MANETs in the sense that they both lack in network infrastructure. However, their primary difference is the lack of ____ 

 End-to-end communication 

 Storage 

 Processing power 

 All of these 

Answer :End-to-end communication 

6) Multi-UAV systems have preferably ____________ antennas, whereas single UAV systems have omni-directional antennas. 

 Omni-directional 

 Bi-directional 

 Directional 

 None of these 

Answer :Directional 

7) Similar to vehicular networks, which are termed VANETs, UAV networks are popularly termed as: 

 UANETs 

 FANETs 

 WINETs 

 All of these 

Answer :FANETs 

8) Yaw, Pitch and Roll values are determined from which sensor? 

 Accelerometer 

 Gyroscope 

 Magnetometer 

 Barometer 

Answer :Gyroscope 

9) An UAV SDN implementation encompasses data and ________ planes of communication. 

 Process 

 Resource 

 Control 

 Display 

Answer :Control 


10) In ProPHET, the use of ___ allows to update the contact probability with a node with whom there has been no contact lately 

Paging 

Aging 

Indexing 

Casing 

Answer :Aging 


1) Solution for optimal coverage includes the important parameters as: 

 Coverage requirement 

 Detection time 

 Number of sensors 

 All of the above 

Answer :All of the above 

2) Typically, ratio between transmission range and sensing range is: 

 2:1 

 1:1 

 1:2 

 None of the above 

Answer :2:1 

3) Adequate placement of sensor node is important to ensure 

 Adequate power consumption 

 Adequate transmission 

 Adequate coverage 

 None of these 

Answer :Adequate coverage 

4) An example of coverage algorithm is 

 CoRD 

 OGDC 

 OMN 

 All of these 

Answer :OGDC 

5) Which of the following algorithms is known for establishing the connectivity in the presence of dumb nodes? 

 INTSEM 

 CoRD 

 OGDC 

 None of the above 

Answer :CoRD 

6) Which statement is false in context of the LEACH protocol? 

 In the setup phase, clusters are created and cluster heads are determined 

 The nodes join the cluster nearest to them with the strongest signal 

 In the steady state phase, CSMA-based solutions are used for inter-cluster communication  In the steady state phase, TDMA-based solutions are used for inter-cluster communication 

Answer :In the steady state phase, CSMA-based solutions are used for inter-cluster communication


7) Which statement is false with respect to the EMACs protocol? 

 EMACs is a fully centralized algorithm 

 The active nodes periodically transmit short control messages 

 The dormant nodes are the nodes which run critically low in energy 

 None of the above 

Answer :EMACs is a fully centralized algorithm 

8) K-barrier coverage requires a barrier to be covered by: 

At least k sensors 

 At least 1 sensors 

 At least 2 sensors 

 At least 3 sensors 

Answer : At least k sensors 

9) Which statement is true with respect to the LMAC protocol? 

 The control messages transmitted are of fixed length 

 LMAC ensures collision-free communication 

 A node may transmit either a control message or a data frame during any time slot 

All of the above 

Answer :All of the above 

10)Which is not a variant of S-MAC?

Timeout MAC (TMAC) 

Dynamic sensor MAC (DSMAC) 

Input-Output MAC (IOMAC) 

Data gathering (DMAC) 

Answer :Input-Output MAC (IOMAC) 

1. Which of the following statements does not describe the S-MAC protocol correctly?

Energy dissipation is reduced in S-MAC through idle listening 

 Implementation of the algorithm is simple 

 The sleep and listen vary constantly based on the network traffic conditions 

 All of the above 

Answer :The sleep and listen vary constantly based on the network traffic conditions 

2) Which is not a protocol of SPIN family? 

 SPIN-PP 

 SPIN-PC 

 SPIN-EC 

 SPIN-BC 

Answer :SPIN-PC 

3) The goal of participatory sensing is/are 

 Only collect data 

 Allow people to access data 

 Share knowledge 

 All of the above 

Answer :All of the above 

4) Why is implementation of MAC protocols important in context of WSNs? 

 Supports multi-hop communication, alongside single-hop 

 Special design for energy-constrained environments 

 Support for Ad-hoc node deployment 

 All of the above 

Answer :All of the above 

5) Which is not a cause for undesired energy wastage in WSNs? 

 Sensing of events 

 Idle listening 

 Overhearing in case of densely deployed sensor networks 

 Collision of transmitted frames 

Answer :Sensing of events 

6) Which of the following is the example of flat routing? 

 SPIN 

 CFFR 

 All of these 

 None of these 

Answer :SPIN 

7) LEACH uses dynamic _______ cycles. 

 CDMA 

 FDMA 

 TDMA 

 OFDMA 

Answer :TDMA 

8) Which is a negotiation based routing scheme? 

 Directed Diffusion 

 SPIN 

 SPEED 

 TTDD 

Answer :SPIN 

9) What is the difference between the 3-color and 4-color topdisc mechanisms?

a. 4-color topdisc mechanism does not have a cluster head node

b. Unlike the 3-color topdisc, nodes may have 

red or blue color in 4-color topdisc mechanism

c. Grey color is not present in 3-color topdisc mechanism

d. Dark grey color is not present in 3-color topdisc mechanism 

Answer :Dark grey color is not present in 3-color topdisc mechanismz

10) Which statement is false in context of the LEACH protocol? 

In the setup phase, clusters are created and cluster heads are determined 

The nodes join the cluster nearest to them with the strongest signal 

In the steady state phase, CSMA-based solutions are used for inter-cluster communication 

In the steady state phase, TDMA-based solutions are used for inter-cluster communication 

Answer :In the steady state phase, CSMA-based solutions are used for inter-cluster communication 


1)In Congestion Control, a bit can be set in a packet moving in the direction opposite to congestion in 

 Implicit Signaling 

 Backward Signaling 

 Source Signaling 

 Data Signaling 

Answer :Backward Signaling 

2) There is no communication between congested node or nodes and source in the 

 Implicit Signaling 

 IP Signaling 

 Source Signaling 

 Data Signaling 

Answer :Implicit Signaling 

3) In Congestion, formula to calculate Average Data Rate (ADR) is 

 Amount of Data/Stream 

 Amount of Data/Protocol 

 Amount of Data/Time 

 Packet 

Answer :Amount of Data/Time 

4) In Congestion Control and Quality of Services, our main focus is on 

 Data Protocol 

 Data Layer 

 Data Congestion 

 Data Traffic 

Answer :Data Traffic 

5) ________________ is the best suitable ranging technique among these? (Consider no time synchronization among nodes.) 

 ToA (one-way message transfer) 

 Euclidean distance propagation technique 

 ToA (two-way message transfer) 

 All of the above 

Answer :ToA (two-way message transfer) 

6) For achieving network-wide localization, which are the important parameters for evaluating any localization algorithm? 

 Localization coverage 

 Average localization accuracy 

 Average energy consumption 

 All of these 

Answer :All of these 

7) Underwater mobility affects 

 Topology 

 Link between nodes 

 Coverage 

 All of these 

Answer :All of these 

8) Which statement is true for UWSN 

 High spatio-temporal variability of communication channel 

 Less transmission power required 

 No memory required for data caching 

 None of these 

Answer :High spatio-temporal variability of communication channel 

9) The UWSN network could be 

 Star topology 

 Cluster topology 

 Mesh topology 

 All of these 

Answer : All of these 

10)No. of reference points required for localizing a node in 3D coordinate systems is ______. 

 4 

 3 

 5 

 None of these 

Answer :

1) Which of the following jamming attacks is time specific? 

 Constant jamming 

 Intermittent jamming 

 Deceptive jamming 

 Reactive jamming 

Answer :Intermittent jamming 

2) The primary challenges of embedded operating system are 

 Small memory footprint 

 Efficient in power and computation 

 Lack hardware parallelism 

 All of these 

Answer :All of these 

3) Advantages of Event-Driven Model operating system in WSN are 

 Concurrency with low resources 

 Complements the way networking protocols work 

 Inexpensive scheduling technique 

 All of these 

Answer :All of these 

4) Example of Event-Driven Model operating system (OS) in WSN is 

 Mantis OS 

 RETOS 

 TinyOS 

 None of these 

Answer :TinyOS 

5) A Bluetooth network consists of one primary device(s) and up to ____ secondary devices. 

 Five 

 Two 

 Seven 

 Nine 

Answer :Seven 

6) Radar is one kind of ________ sensor 

 Passive 

 Active 

 Dead 

 None of these 

Answer :Active 

7) One malicious node behaves like multiple nodes, this type of attack is known as 

 Byzantine attack 

 Sybil attack 

 DoS attack 

 Spoofing 

Answer :Sybil attack 

8) The flash memory of microcontroller in a sensor node is used to 

 Hold a data base 

 Hold a data sheet only 

 Hold a program code 

 Hold program variables only 

Answer :Hold a program code 

9)An example of Selective forwarding attack is: 

 Forwarding attack 

 Sinkhole attack 

 Selectivity attack 

 None of these 

Answer :Sinkhole attack 

10)Traditional cryptographic algorithms cannot be used directly in WSN, because sensor nodes are 

 Resource constrained. 

 Memory-less 

 Clock-less 

Processor-less 

Answer :Resource constrained. 


Post a Comment

0 Comments