AD HOC AND SENSOR NETWORK MCQ QUESTION
Question : A vehicular ad hoc network (VANET) can be
used ----- loads, and
1. to
alert drivers of traffic jams ahead, help balance traffic informing the
2. balance
traffic loads, and reduce traveling time by
3. close
the jam route
4. to
observe the road to maintain street safty
ANSWER : A
Question : For forwarding data packet from one node to another following protocol in VANET can be used --------- .
1. Delay Tolerant Network
2. TCP/IP
3. UDP
4. IP
Question : The channel is divided into frames in
___________ .
1. D-PRMA
2. MARCH
3. BTMA
ANSWER : A
Question : What is VANET stands for -------- .
1. Vehicular
AdHoc Network
2. Vehicular
Address Network
3. Vehicular
Adhoc Neural Network
4. Wireless
Sensor Networks
ANSWER : A
Question : Which of these is not a fast fading
propogation mechanisms?
1. Reflection
2. Diffraction
3. Refraction
4. Scattering
ANSWER : C
Question : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.
1. Blackhole attack
2. Wormhole attack
3. Byzantine attack
4. Information disclosure
Question : Application Controlled Transport
Protocol ---------
1. Provides
freedom of choosing the required choosing the required
2. Is
very compatible with TCP
3. Is
very not compatible with TCP
4. is
Less dependent on routing protocol
ANSWER : A
Question : What type of routing is used in VANET?
1. Single
layer routing
2. Cross
Layer Routing
3. Hybrid
Routing
4. AP
Routing
ANSWER : B
Question : In __________ an adversary node
advertises routes to non-existent nodes, to the authorized nodes present in the
network.
1. Routing
table poisoning
2. Route
cache poisoning
3. Routing
table overflow
4. Packet
replication
ANSWER : C
Question : The wireless transmission is divided
into ___________ .
1. 3
broad groups
2. 6
broad groups
3. 9
broad groups
4. 8
broad groups
Question : In Security Aware AODV Protocol ------ .
1. the route discovery process is initiated by
2. the route discovery process is initiated by sending RTS
3. the route discovery process is initiated by
4. the route discovery process is initiated by
Question : Repudiation refers to the ------- .
1. attempted
denial by a node involved in a communication
2. selection
of node involved in a communication of having
3. selectively
dropping packets
4. disrupt
the normal operation of the network
ANSWER : A
Question : The Random Direction mobility model was
created to overcome ----- .
1. Collision
2. Cogestion
3. Density
Waves
4. Interference
1. Receives packets at one location in the network
2. creates routing loops
3. selectively dropping packets
4. may leak confidential information to unauthorized-
1. TKIP
2. SAP
3. DOA
4. TKP
ANSWER : A
Question : Following are considered as
characteristics of VANET.
1. Static
Topology
2. Wired
communication
3. Fixed
ifrastucture
4. Mobility
Modeling and Prediction
Question : BTMA protocol comes under which
mechanism?
1. Contention
Based Protocols
2. Contentionbased
protocols with reservation mechanisms
3. MAC
protocols
4. Contentionbased
protocols with scheduling
ANSWER : A
Question : Classification of routing protocol is
based on _________ .
1. Routing
information update mechanism
2. Protocol(DSDV)
Routing topology
3. Utilization
of specific resources
4. Processing
Utilization
Question : In which protocol probability of colliision is very low but bandwidth utilization is very poor?
1. BTMA
2. FAMA
3. MARCH
4. PRMA
Question : Enhanced Distributed Channel Access
(EDCA) allows ----- .
1. Adhoc
sensors
2. Wired
communication
3. Safety
messages
4. Physical
infrastrucute
ANSWER : C
Question : In __________ an adversary node
advertises routes to non-existent nodes, to the authorized nodes present in the
network.
1. Routing
table poisoning
2. Route
cache poisoning
3. Routing
table overflow
4. Packet
replication
Question : Which protocol ensure that all nodes are
treated fairly with respect to bandwidth allocation?
1. MAC
2. MACAW
3. BTMA
4. PRMA
ANSWER : A
Question : _____________ is a standard from the
WifiAlliance based upon the IEEE 802.11i.
1. WEP
2. WPA
3. WPA2
4. IEEE
802.11
Question : Which one of the following event is not
possible in wireless LAN?
1. Collision
detection
2. Acknowledgeme
nt of data frames
3. Multi-mode
data transmission
4. Connection
to wired networks
Question : Which of the following protocol is
single-channel protocol of Contention-Based protocols?
1. BTMA
2. DBTMA
3. MACAW
4. RTMAC
Question : Which of the following protocol was
developed with the main objective of supporting integrated services of
real-time and non-Realtime applications in ad hoc wireless networks, at the same
time maximizing the statistical multiplexing gain?
1. Soft
Reservation Multiple Access with Priority Assignment
2. Hop
Reservation Multiple Access Protocol
3. Five-Phase
Reservation Protocol
4. MACA
with Piggy-Backed Reservation
Question : In this ________ attack, an adversary node replicates stale packets.
1. Routing table poisoning
2. Route cache poisoning
3. Packet replication
4. Routing table overflow
Question : The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple access protocols in wired networks.
1. FAMA
2. BTMA
3. MACA
4. MACAW
Question : Which one is the first protocols
proposed for adhoc wireless networks?
1. Wireless
routing protocol(WRP)
2. Destination
sequenced distance-vector routing
3. Source-tree
adaptive routing protocol (STAR)
4. Dynamic
source routing protocol (DSR)
ANSWER :B
Question : Ad-hoc network connects each computer using which network topology?
1. Three
2. Mesh
3. Star
4. Bus
Question : In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?
1. BTMA
2. FAMA
3. MARCH
4. PRMA
Question : Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?
1. Proactive Routing Protocol
2. Hybrid Routing Protocol
3. Power Aware Routing Protocol
4. Reactive Routing Protocol
Question : When using ________there is a shared key
between all the stations and access points.
1. WPA
2. WEP
3. ICV
4. SSID
ANSWER : A
Question : IEEE 802.2: specifies……
1. the Logical Link Control (LLC)
2. the Phisical Link Control (PLC)
3. OSI Layers
4. the Route Link Control (RLC)
Question : Two known attacks on WPA are
____________ and DOS attack.
1. Session
Hijacking
2. Dictionary
Attack
3. Rushing
Attack
4. Jamming
ANSWER : B
Question : A ________ broadcast storm occurs when
broadcast or multicast packets flood the LAN.
1. MAN
2. WAN
3. LAN
4. None
of these
Question : In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head of its queue.
1. Source id
2. Sequence number
3. Destination id
4. Receiver id
Question : The ____________ represents a set of mobile nodes (e.g., robots) that move in a certain fixed direction.
1. Column Mobility Model
2. Overlap Mobility Model
3. In-Place Mobility Model
4. Reference Point Group Mobility Model
Question : In this type of attack, an adversary
attempts to prevent consume/waste away resources of other nodes present in the
network.
1. Resource
consumption attack
2. Blackhole
Attack
3. Denial
of Service Attack
4. Wormhole
attack
ANSWER : C
Question : In wireless ad-hoc network ____
1. Access
point is must
2. Access
point is not required
3. Nodes
are not required
4. All
nodes are access points
ANSWER : B
Question : The basic idea of the aggregation scheme
is based on so-called landmarks.
1. Judging
the quality of information
2. Landmarkbased
aggregation
3. Hierarchical
landmark aggregation
4. Wired
landmark
Question : Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced services,high scalability, easy extensibility, high availability & low cost per bit.
1. Military applications
2. Emergency Operation
3. Wireless Sensor Network
4. Wireless Mesh Network
Question : Communication in vehicular environment are provided by ----- .
1. using a OSI Model
2. using a wireless medium 802.11p which is based out of 802.11 standard
3. Satellite communication
4. using a wireless medium 820.11p which is based out of
Question : In RI-BTMA the data packets are divided
into two portions a _________ and actual data packets.
1. Asynchronous
2. Synchronous
3. Preamble
4. Free
Question : Mostly ________ is used in wireless LAN.
1. Space
division multiplexing
2. Channel
division multiplexing
3. Orthogonal
frequency division multiplexing
4. Time
division multiplexing
ANSWER : C
Question : VANET refers for ------ .
1. Inter
vehicuar communication
2. Communication
between devices
3. Communication
between Aps
4. Communication
between Wired Network
Question : The objectives of transport layer protocol include:
1. Bandwidth allocation
2. end-to-end delivery of data packets
3. Path finding
4. Speed of transmission
Question : One advantage that DSR has over DSDV due to its on-demand nature.
1. New link is generated
2. Routing adapts to load
3. Sequence number is updated
4. No New link is generated
Question : Delay-Tolerant Routing is used in ----
1. Delivering
advertisements
2. Sensing
element
3. Path
finding
4. Information
Processing
Question : _____________ is a standard from the
WifiAlliance based upon the IEEE 802.11i.
1. WEP
2. WPA
3. WPA2
4. IEEE
802.11
ANSWER : A
Question : In _________ attack, an attacker
receives packets at one location in the network and tunnels them to another
location in the network, where the packets are resent into the
1. Blackhole
attack
2. Wormhole
attack
3. Byzantine
attack
4. Information
disclosure
ANSWER : B
Question : When using ________there is a shared key
between all the stations and access points.
1. WPA
2. WEP
3. ICV
4. SSID
ANSWER : B
Question : Wireless routing protocol is an example of _____________ .
1. Proactive routing protocol
2. Reactive routing protocol
3. Hybrid routing protocol
4. Source initiated Routing Protocol
Question : Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are commonly use techniques to overcome __________ attacks.
1. Passive Atttack
2. Active Attack
3. Snooping
4. Jamming
Question : Classification of MAC Protocol consist of ___ .
1. Contention based protocol
2. Security based protocol
3. Power control MAC Protocol
4. Receiver based Autorate protocol
ANSWER : A
Question : The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously made throughout the network and no ordering among nodes is followed.
1. "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"
2. "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless network "
3. "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "
4. "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the impending DATA packets"
Question : In this ________ attack, an adversary node replicates stale packets.
1. Routing table poisoning
2. Route cache poisoning
3. Packet replication
4. Routing table overflow
0 Comments