Header Ads

AD HOC AND SENSOR NETWORK MCQ QUESTION 5

AD HOC AND SENSOR NETWORK MCQ QUESTION

 

Question : A vehicular ad hoc network (VANET) can be used ----- loads, and

1.       to alert drivers of traffic jams ahead, help balance traffic informing the

2.       balance traffic loads, and reduce traveling time by

3.       close the jam route

4.       to observe the road to maintain street safty

 ANSWER :  A



Question   : For forwarding data packet from one node to another following protocol in VANET can be used --------- .

1.       Delay Tolerant Network

2.       TCP/IP

3.       UDP

4.       IP

  ANSWER :  A

 

Question  : The channel is divided into frames in ___________ .

1.       D-PRMA

2.       MARCH

3.       BTMA

ANSWER :  A

 

Question   : What is VANET stands for -------- .

1.       Vehicular AdHoc Network

2.       Vehicular Address Network

3.       Vehicular Adhoc Neural Network

4.       Wireless Sensor Networks

ANSWER :  A

Question  : Which of these is not a fast fading propogation mechanisms?

1.       Reflection

2.       Diffraction

3.       Refraction

4.       Scattering

ANSWER :  C


Question   : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.

1.       Blackhole attack

2.       Wormhole attack

3.       Byzantine attack

4.       Information disclosure

  ANSWER :  A


Question   : Application Controlled Transport Protocol ---------

1.       Provides freedom of choosing the required choosing the required

2.       Is very compatible with TCP

3.       Is very not compatible with TCP

4.       is Less dependent on routing protocol

ANSWER :  A



Question   : What type of routing is used in VANET?

1.       Single layer routing

2.       Cross Layer Routing

3.       Hybrid Routing

4.       AP Routing

ANSWER :  B

 

Question   : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.

1.       Routing table poisoning

2.       Route cache poisoning

3.       Routing table overflow

4.       Packet replication

ANSWER :  C



Question   : The wireless transmission is divided into ___________ .

1.       3 broad groups

2.       6 broad groups

3.       9 broad groups

4.       8 broad groups

ANSWER :  A

Question  : In Security Aware AODV Protocol ------ .

1.       the route discovery process is initiated by

2.       the route discovery process is initiated by sending RTS

3.       the route discovery process is initiated by

4.       the route discovery process is initiated by

  ANSWER :  A


Question   : Repudiation refers to the ------- .

1.       attempted denial by a node involved in a communication

2.       selection of node involved in a communication of having

3.       selectively dropping packets

4.       disrupt the normal operation of the network

ANSWER :  A



Question   : The Random Direction mobility model was created to overcome ----- .

1.       Collision

2.       Cogestion

3.       Density Waves

4.       Interference

ANSWER :  C


 Question  : Wormhole Attack ------ .

1.       Receives packets at one location in the network

2.       creates routing loops

3.       selectively dropping packets

4.       may leak confidential information to unauthorized-

  ANSWER :  A

 

 

 Question   : In WPA, a choice can be made between either __________ or WEP2.

1.       TKIP

2.       SAP

3.       DOA

4.       TKP

ANSWER :  A

 

Question   : Following are considered as characteristics of VANET.

1.       Static Topology

2.       Wired communication

3.       Fixed ifrastucture

4.       Mobility Modeling and Prediction

ANSWER :  D

 

Question   : BTMA protocol comes under which mechanism?

1.       Contention Based Protocols

2.       Contentionbased protocols with reservation mechanisms

3.       MAC protocols

4.       Contentionbased protocols with scheduling

ANSWER : A

 

Question  : Classification of routing protocol is based on _________ .

1.       Routing information update mechanism

2.       Protocol(DSDV) Routing topology

3.       Utilization of specific resources

4.       Processing Utilization

ANSWER : D 

 

Question  : In which protocol probability of colliision is very low but bandwidth utilization is very poor?

1.       BTMA

2.       FAMA

3.       MARCH

4.       PRMA

  ANSWER :  A

 

Question   : Enhanced Distributed Channel Access (EDCA) allows ----- .

1.       Adhoc sensors

2.       Wired communication

3.       Safety messages

4.       Physical infrastrucute

ANSWER : C   

 

Question   : In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes present in the network.

1.       Routing table poisoning

2.       Route cache poisoning

3.       Routing table overflow

4.       Packet replication

ANSWER : C 

 

Question   : Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?

1.       MAC

2.       MACAW

3.       BTMA

4.       PRMA

ANSWER :  A 

 

Question   : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.

1.       WEP

2.       WPA

3.       WPA2

4.       IEEE 802.11

ANSWER :  C

 

Question   : Which one of the following event is not possible in wireless LAN?

1.       Collision detection

2.       Acknowledgeme nt of data frames

3.       Multi-mode data transmission

4.       Connection to wired networks

ANSWER : A 

 

Question  : Which of the following protocol is single-channel protocol of Contention-Based protocols?

1.       BTMA

2.       DBTMA

3.       MACAW

4.       RTMAC

ANSWER :  MACAW

 

Question  : Which of the following protocol was developed with the main objective of supporting integrated services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time maximizing the statistical multiplexing gain?

1.       Soft Reservation Multiple Access with Priority Assignment

2.       Hop Reservation Multiple Access Protocol

3.       Five-Phase Reservation Protocol

4.       MACA with Piggy-Backed Reservation

ANSWER :    Soft Reservation Multiple Access with Priority Assignment

 

Question  : In this ________ attack, an adversary node replicates stale packets.

1.       Routing table poisoning

2.       Route cache poisoning

3.       Packet replication

4.       Routing table overflow

  ANSWER :  C  

 

Question  : The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.

1.       FAMA

2.       BTMA

3.       MACA

4.       MACAW

  ANSWER :  C

 

Question   : Which one is the first protocols proposed for adhoc wireless networks?

1.       Wireless routing protocol(WRP)

2.       Destination sequenced distance-vector routing

3.       Source-tree adaptive routing protocol (STAR)

4.       Dynamic source routing protocol (DSR)

ANSWER :B    

 

Question  : Ad-hoc network connects each computer using which network topology?

1.       Three

2.       Mesh

3.       Star

4.       Bus

  ANSWER :  B

 

Question  : In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?

1.       BTMA

2.       FAMA

3.       MARCH

4.       PRMA

  ANSWER :  B

 

Question  : Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?

1.       Proactive Routing Protocol

2.       Hybrid Routing Protocol

3.       Power Aware Routing Protocol

4.       Reactive Routing Protocol

  ANSWER :  C

 

Question  : When using ________there is a shared key between all the stations and access points.

1.       WPA

2.       WEP

3.       ICV

4.       SSID

ANSWER :  A   

 

Question  : IEEE 802.2: specifies……

1.       the Logical Link Control (LLC)

2.       the Phisical Link Control (PLC)

3.       OSI Layers

4.       the Route Link Control (RLC)

  ANSWER :  A

 

Question  : Two known attacks on WPA are ____________ and DOS attack.

1.       Session Hijacking

2.       Dictionary Attack

3.       Rushing Attack

4.       Jamming

ANSWER :  B  

 

Question    : A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.

1.       MAN

2.       WAN

3.       LAN

4.       None of these

ANSWER :  C

 

Question  : In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.

1.       Source id

2.       Sequence number

3.       Destination id

4.       Receiver id

  ANSWER :  B

 

Question  : The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.

1.       Column Mobility Model

2.       Overlap Mobility Model

3.       In-Place Mobility Model

4.       Reference Point Group Mobility Model

  ANSWER :  A

 

 

Question   : In this type of attack, an adversary attempts to prevent consume/waste away resources of other nodes present in the network.

1.       Resource consumption attack

2.       Blackhole Attack

3.       Denial of Service Attack

4.       Wormhole attack

ANSWER : C  

 

Question   : In wireless ad-hoc network ____

1.       Access point is must

2.       Access point is not required

3.       Nodes are not required

4.       All nodes are access points

 ANSWER :  B 

 

Question   : The basic idea of the aggregation scheme is based on so-called landmarks.

1.       Judging the quality of information

2.       Landmarkbased aggregation

3.       Hierarchical landmark aggregation

4.       Wired landmark

ANSWER :  B

 

Question  : Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced services,high scalability, easy extensibility, high availability & low cost per bit.

1.       Military applications

2.       Emergency Operation

3.       Wireless Sensor Network

4.       Wireless Mesh Network

  ANSWER :  D

 

Question   : Communication in vehicular environment are provided by ----- .

1.       using a OSI Model

2.       using a wireless medium 802.11p which is based out of 802.11 standard

3.       Satellite communication

4.       using a wireless medium 820.11p which is based out of

  ANSWER :  B

 

Question   : In RI-BTMA the data packets are divided into two portions a _________ and actual data packets.

1.       Asynchronous

2.       Synchronous

3.       Preamble

4.       Free

ANSWER :  C

 

Question   : Mostly ________ is used in wireless LAN.

1.       Space division multiplexing

2.       Channel division multiplexing

3.       Orthogonal frequency division multiplexing

4.       Time division multiplexing

 ANSWER :  C

 


Question   : VANET refers for ------ .

1.       Inter vehicuar communication

2.       Communication between devices

3.       Communication between Aps

4.       Communication between Wired Network

ANSWER :  A

 

Question   : The objectives of transport layer protocol include:

1.       Bandwidth allocation

2.       end-to-end delivery of data packets

3.       Path finding

4.       Speed of transmission

  ANSWER :  B

Question  : One advantage that DSR has over DSDV due to its on-demand nature.

1.       New link is generated

2.       Routing adapts to load

3.       Sequence number is updated

4.       No New link is generated

  ANSWER :  B

 

Question  : Delay-Tolerant Routing is used in ----

1.       Delivering advertisements

2.       Sensing element

3.       Path finding

4.       Information Processing

ANSWER : A  

 

Question  : _____________ is a standard from the WifiAlliance based upon the IEEE 802.11i.

1.       WEP

2.       WPA

3.       WPA2

4.       IEEE 802.11

 ANSWER :  A

Question  : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the

1.       Blackhole attack

2.       Wormhole attack

3.       Byzantine attack

4.       Information disclosure

ANSWER :  B 

Question : When using ________there is a shared key between all the stations and access points.

1.       WPA

2.       WEP

3.       ICV

4.       SSID

ANSWER : B     

 

Question   : Wireless routing protocol is an example of _____________ .

1.       Proactive routing protocol

2.       Reactive routing protocol

3.       Hybrid routing protocol

4.       Source initiated Routing Protocol

  ANSWER :  A



Question   : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.

1.       Passive Atttack

2.       Active Attack

3.       Snooping

4.       Jamming

  ANSWER :  D

 


Question   : Classification of MAC Protocol consist of ___ .

1.       Contention based protocol

2.       Security based protocol

3.       Power control MAC Protocol

4.       Receiver based Autorate protocol

  ANSWER :  A


Question  : The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.

1.       "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"

2.       "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless network "

3.       "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "

4.       "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the impending DATA packets"

  ANSWER :  A



Question  : In this ________ attack, an adversary node replicates stale packets.

1.       Routing table poisoning

2.       Route cache poisoning

3.       Packet replication

4.       Routing table overflow

  ANSWER :  C

 

Post a Comment

0 Comments