Header Ads

AD HOC AND SENSOR NETWORK MCQ QUESTION 6

 

AD HOC AND SENSOR NETWORK MCQ QUESTION

 Question   : Wireless access in vehicular environments (WAVE)is a ------ .

1.       Network

2.       Protocol

3.       Sensor

4.       Hub

  ANSWER :  B

 

Question   : Denial of Service attack targets _______ Layer.

1.       Physical

2.       Multi

3.       Network

4.       Datalink

  ANSWER :  B

 


Question  : _____________is very important for bandwidth reservations by nodes.

1.       Bandwidth efficiency

2.       Quality of service support

3.       Synchronisation

4.       Hidden and ExposedTerminalProblem

  ANSWER :  C

 

Question   : WPA uses ___________Algorithm to check integrity of the packets.

1.       TKIP

2.       SAP

3.       DOA

4.       TKP

  ANSWER : A

 

Question   : Vehicular adhoc network (VANET) is a tupr of ----- .

1.       Wired Network

2.       Mobile Ad-hoc Network (MANET)

3.       Wireless Sensor Network

4.       Wired Sensor Network

  ANSWER :  B



 

Question  : In WPA, a choice can be made between either __________ or WEP2.

1.       TKIP

2.       SAP

3.       DOA

4.       TKP

  ANSWER :   A

 

Question   : Two known attacks on WPA are ____________ and DOS attack.

1.       Session Hijacking

2.       Dictionary Attack

3.       Rushing Attack

4.       Jamming

  ANSWER :   A

 

Question   : Location disclosure attack targets _______ Layer.

1.       Physical

2.       Transport

3.       Network

4.       Datalink

  ANSWER :   C



Question   : Hidden terninals are nodes that are ……

1.       configured on the network

2.       hidden from the sender of the session

3.       available with sender

4.       hidden from receiver of the session

  ANSWER :   B

 

Question  : Spoofing attack is not considered in -----------------

1.       AODV

2.       DSR

3.       ARAN

4.       ARNA

  ANSWER :   C

 

Question   : The driver is influenced by an approaching preceding vehicle and applies a normal deceleration rate to reach a safe interdistance.

1.       Approaching mode

2.       Free-driving

3.       Following mode

4.       Breaking mode

  ANSWER :   A

 


Question  : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the

1.       Blackhole attack

2.       Wormhole attack

3.       Byzantine attack

4.       Information disclosure

  ANSWER :  B



Question  : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

1.       CSMA/CD

2.       CDMA

3.       CSMA/CA

4.       ALOHA

  ANSWER :  C

 

Question : In this model, each group has a center, which is either a logical center or a group leader node.

1.       In-Place Mobility Model

2.       Overlap Mobility Model

3.       Reference Point Group Mobility Model

4.       Convention Mobility Model

  ANSWER :  C

 

 

Question  : Which is not a disadvantage of using an adhoc network connection?

1.       There are too many issues (lack of security, etc.).

2.       It is good for for every day use.

3.       There are only certain situations where it would be useful.

4.       No dedicated bandwith

  ANSWER :   B

 

   

 

 

Question   : ___________ refers to the process of gaining control of the channel.

1.       BTMA

2.       MARCH

3.       Floor Acquisition

4.       MACA

  ANSWER :   C

 


Question  : WPA uses ___________Algorithm to check integrity of the packets.

1.       TKIP

2.       SAP

3.       DOA

4.       TKP

  ANSWER :  A

 


 

Question   : In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).

1.       macroscopic modeling

2.       mesoscopic modeling

3.       microscopic modeling

4.       path Modelling

  ANSWER :   C

 

Question   : TCP WITH EXPLICIT LINK FAILURE NOTIFICATION: ( TCP-ELFN) ------ .

1.       Improves TCP performance in adhoc wireless network

2.       services from network and physical layers for improving its

3.       services from network and MAC layers for improving its

4.       services from network and CSMA layers for improving its

  ANSWER :   A

 

Question  : Floor Acquisition Multiple Access Protocols (FAMA) is based on --------- .

1.       Carrier-sensing operation

2.       Bandwidth limitation

3.       Collision

4.       Hidden Channel

  ANSWER :   A

 

Question   : In this attack, a malicious node falsely advertises good paths to the destination node during the path-finding process or in the route update messages.

1.       Active Attack

2.       Blackhole Attack

3.       Denial of Service Attack

4.       Wormhole attack

  ANSWER :   A

 


 

 

Question    : Cache poisoning is recognized in____ .

1.       AODV

2.       DSR

3.       ARAN

4.       ARNA

  ANSWER :   B

 


 

 


 

Question   : Once the TCP-ELFN sender receives the ELFN packet, enters a ________ state.

1.       Previous sender

2.       Snooze

3.       Standby

4.       Null

  ANSWER :   C 

Question   : Symmetric-key algorithms consist of -----

1.       Block ciphers

2.       Hidden Channel

3.       RTS-CTS exchange with carrier-sensing

4.       Link Layers

  ANSWER :   A

 


 

Question  : Which is not a reactive routing information update protocol?

1.       DSR

2.       AODV

3.       DSDV

4.       FORP

   ANSWER :  C

 


 

Question   : _________protocol does not require any bandwidth reservation

1.       Contention based protocol

2.       Security based protocol

3.       Power control MAC Protocol

4.       Receiver based Autorate protocol

   ANSWER :   A

 


   

 

Question   : TCP uses ------------- .

1.       a sliding window for flow control.

2.       high bandwith

3.       wired communication

4.       services from network and MAC layers for improving its

   ANSWER :   A

 

Question  : MARCH protocol comes under ______ .

1.       Sender-intiated Protocol

2.       Synchronous Protocol

3.       Receiverintiated Protocol

4.       Asynchronous Protocol

    ANSWER : C

 

Question   : TCP Over AD HOC Wireless Networks ----

1.       Provides a byte stream based service

2.       Minimize overall transmission power for each connection

3.       Reduce bandwidth consumption

4.       Increases bandwidth consumption

    ANSWER : A

 

Question   : RRTS means ---------- .

1.       Request-for- Request-toSend

2.       Repeat-Requestto-Rend

3.       ReceiveRequest-ofTrasmit-Siignal

4.       Return- Request-ofTrasmit-Siignal

    ANSWER : A

 

Question   : Flooding-based mechanisms classified as ---- -

1.       Hybrid mechanisms

2.       Forwardingbased

3.       Disseminationbased

4.       Priority-based

    ANSWER : D

 

Question  : In this attack, a malicious node tries to consume/waste away resources of other nodes present in the network.

1.       Resource consumption attack

2.       Blackhole Attack

3.       Denial of Service Attack

4.       Wormhole attack

    ANSWER :A

 

Question  : Major advantage of Wireless Mesh Network is -----

1.       Less physical infrastructure

2.       High scalability

3.       Wired communication

4.       Dedicated Bandwidth

    ANSWER : B

 

Question  : Which is type of Table driven Routing Protocol?

1.       AODV

2.       CSGR

3.       STAR

4.       CSMA

    ANSWER : 

 

 


 

 

Question   : In TCP, when ATCP is in the DISCONNECTED state then --------- .

1.       remains in normal state

2.       remains in loss state

3.       remains in congested state

4.       remains in same state

    ANSWER : D

 

Question   : Which is a proactive routing information update protocol?

1.       AODV

2.       STAR

3.       DSR

4.       FORP

    ANSWER : B

 

Question   : ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for -------- .

1.       Detection, avoidance and control of congestion

2.       Successful delivery of the packet

3.       maximum delay

4.       provide simple feedback information

    ANSWER : A

 

Question   : Internal attacks are from ------ .

1.       Compromised- nodes that are actually part of the network

2.       carried out by nodes that do not belong to the network

3.       carried out by nodes that belong to the network

4.       Receiver

    ANSWER : A

 

Question  : In _________ attack, a malicious node falsely advertises good paths to the destination node during the path-finding process.

1.       Blackhole attack

2.       Wormhole attack

3.       Byzantine attack

4.       Information disclosure

    ANSWER : A

 


 

 

 

Post a Comment

0 Comments