AD HOC AND SENSOR NETWORK MCQ QUESTION
Question : Wireless access in vehicular environments (WAVE)is a ------ .
1. Network
2. Protocol
3. Sensor
4. Hub
Question : Denial of Service attack targets _______ Layer.
1. Physical
2. Multi
3. Network
4. Datalink
Question : _____________is very important for
bandwidth reservations by nodes.
1. Bandwidth
efficiency
2. Quality
of service support
3. Synchronisation
4. Hidden
and ExposedTerminalProblem
ANSWER : C
Question : WPA uses ___________Algorithm to check
integrity of the packets.
1. TKIP
2. SAP
3. DOA
4. TKP
ANSWER : A
Question : Vehicular adhoc network (VANET) is a tupr of ----- .
1. Wired Network
2. Mobile Ad-hoc Network (MANET)
3. Wireless Sensor Network
4. Wired Sensor Network
Question : In WPA, a choice can be made between
either __________ or WEP2.
1. TKIP
2. SAP
3. DOA
4. TKP
ANSWER : A
Question : Two known attacks on WPA are ____________
and DOS attack.
1. Session
Hijacking
2. Dictionary
Attack
3. Rushing
Attack
4. Jamming
ANSWER : A
Question : Location disclosure attack targets
_______ Layer.
1. Physical
2. Transport
3. Network
4. Datalink
ANSWER : C
Question : Hidden terninals are nodes that are ……
1. configured
on the network
2. hidden
from the sender of the session
3. available
with sender
4. hidden
from receiver of the session
ANSWER : B
Question : Spoofing attack is not considered in
-----------------
1. AODV
2. DSR
3. ARAN
4. ARNA
ANSWER : C
Question : The driver is influenced by an
approaching preceding vehicle and applies a normal deceleration rate to reach a
safe interdistance.
1. Approaching
mode
2. Free-driving
3. Following
mode
4. Breaking
mode
ANSWER : A
Question : In _________ attack, an attacker receives packets at one location in the network and tunnels them to another location in the network, where the packets are resent into the
1. Blackhole attack
2. Wormhole attack
3. Byzantine attack
4. Information disclosure
Question : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
1. CSMA/CD
2. CDMA
3. CSMA/CA
4. ALOHA
Question : In this model, each group has a center, which is either a logical center or a group leader node.
1. In-Place Mobility Model
2. Overlap Mobility Model
3. Reference Point Group Mobility Model
4. Convention Mobility Model
Question : Which is not a disadvantage of using an
adhoc network connection?
1. There
are too many issues (lack of security, etc.).
2. It
is good for for every day use.
3. There
are only certain situations where it would be useful.
4. No
dedicated bandwith
ANSWER : B
Question : ___________ refers to the process of
gaining control of the channel.
1. BTMA
2. MARCH
3. Floor
Acquisition
4. MACA
ANSWER : C
Question : WPA uses ___________Algorithm to check integrity of the packets.
1. TKIP
2. SAP
3. DOA
4. TKP
Question : In flow models, _____ commands the car’s acceleration/deceleration in order to maintain either a safe distance headway or to guarantee a safe time headway (reaction time).
1. macroscopic
modeling
2. mesoscopic
modeling
3. microscopic
modeling
4. path
Modelling
ANSWER : C
Question : TCP WITH EXPLICIT LINK FAILURE
NOTIFICATION: ( TCP-ELFN) ------ .
1. Improves
TCP performance in adhoc wireless network
2. services
from network and physical layers for improving its
3. services
from network and MAC layers for improving its
4. services
from network and CSMA layers for improving its
ANSWER : A
Question : Floor Acquisition Multiple Access
Protocols (FAMA) is based on --------- .
1. Carrier-sensing
operation
2. Bandwidth
limitation
3. Collision
4. Hidden
Channel
ANSWER : A
Question : In this attack, a malicious node falsely
advertises good paths to the destination node during the path-finding process
or in the route update messages.
1. Active
Attack
2. Blackhole
Attack
3. Denial
of Service Attack
4. Wormhole
attack
ANSWER : A
Question : Cache poisoning is recognized in____ .
1. AODV
2. DSR
3. ARAN
4. ARNA
ANSWER : B
Question : Once the TCP-ELFN sender receives the
ELFN packet, enters a ________ state.
1. Previous
sender
2. Snooze
3. Standby
4. Null
ANSWER : C
Question : Symmetric-key algorithms consist of -----
1. Block
ciphers
2. Hidden
Channel
3. RTS-CTS
exchange with carrier-sensing
4. Link
Layers
ANSWER : A
Question : Which is not a reactive routing
information update protocol?
1. DSR
2. AODV
3. DSDV
4. FORP
ANSWER : C
Question : _________protocol does not require any
bandwidth reservation
1. Contention
based protocol
2. Security
based protocol
3. Power
control MAC Protocol
4. Receiver
based Autorate protocol
ANSWER : A
Question : TCP uses ------------- .
1. a
sliding window for flow control.
2. high
bandwith
3. wired
communication
4. services
from network and MAC layers for improving its
ANSWER : A
Question : MARCH protocol comes under ______ .
1. Sender-intiated
Protocol
2. Synchronous
Protocol
3. Receiverintiated
Protocol
4. Asynchronous
Protocol
ANSWER : C
Question : TCP Over AD HOC Wireless Networks ----
1. Provides
a byte stream based service
2. Minimize
overall transmission power for each connection
3. Reduce
bandwidth consumption
4. Increases
bandwidth consumption
ANSWER : A
Question : RRTS means ---------- .
1. Request-for-
Request-toSend
2. Repeat-Requestto-Rend
3. ReceiveRequest-ofTrasmit-Siignal
4. Return-
Request-ofTrasmit-Siignal
ANSWER : A
Question : Flooding-based mechanisms classified as
---- -
1. Hybrid
mechanisms
2. Forwardingbased
3. Disseminationbased
4. Priority-based
ANSWER : D
Question : In this attack, a malicious node tries to
consume/waste away resources of other nodes present in the network.
1. Resource
consumption attack
2. Blackhole
Attack
3. Denial
of Service Attack
4. Wormhole
attack
ANSWER :A
Question : Major advantage of Wireless Mesh Network
is -----
1. Less
physical infrastructure
2. High
scalability
3. Wired
communication
4. Dedicated
Bandwidth
ANSWER : B
Question : Which is type of Table driven Routing
Protocol?
1. AODV
2. CSGR
3. STAR
4. CSMA
Question : In TCP, when ATCP is in the DISCONNECTED
state then --------- .
1. remains
in normal state
2. remains
in loss state
3. remains
in congested state
4. remains
in same state
ANSWER : D
Question : Which is a proactive routing information
update protocol?
1. AODV
2. STAR
3. DSR
4. FORP
ANSWER : B
Question : ADHOC TRANSPORT PROTOCOL (ATP) uses
information from lower layers for -------- .
1. Detection,
avoidance and control of congestion
2. Successful
delivery of the packet
3. maximum
delay
4. provide
simple feedback information
ANSWER : A
Question : Internal attacks are from ------ .
1. Compromised-
nodes that are actually part of the network
2. carried
out by nodes that do not belong to the network
3. carried
out by nodes that belong to the network
4. Receiver
ANSWER : A
Question : In _________ attack, a malicious node
falsely advertises good paths to the destination node during the path-finding
process.
1. Blackhole
attack
2. Wormhole
attack
3. Byzantine
attack
4. Information
disclosure
ANSWER : A
0 Comments