Wanet Mid-2 MCQS
Wanet Mid-2 MCQS
1. In _________ attack, a malicious node falsely advertises good paths to the destination node during
the path-finding process.
a) Blackhole attack
b) Wormhole attack
c) Byzantine attack
d) Information disclosure
2. For forwarding data packet from one node to another following protocol in VANET can be used ---------
.
b) TCP/IP
c) UDP
d) IP
4. The network in which all the nodes are symmetric and there is no central control or hierarchy is
a) MANET
b) Client-Server Technology
c) Peer-to-Peer
d) VANET
6. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks.
a) Passive Atttack
b) Active Attack
c) Snooping
d) Jamming
7. In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a
____________________
8. In which protocol probability of colliision is very low but bandwidth utilization is very poor?
a) BTMA
b) FAMA
c) MARCH
d) PRMA
c) Packet replication
10. Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless
network?
b) Quality of Service
c) Throughput
d) Routing
11. The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple
access protocols in wired networks.
a) FAMA
b) BTMA
c) MACA
d) MACAW
12. Ad-hoc network connects each computer using which network topology?
a) Three
b) Mesh
c) Star
d) Bus
a) Transmitting a packet
d) Reliability
14. In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?
a) BTMA
b) FAMA
c) MARCH
d) PRMA
15. Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?
16. In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head
of its queue.
a) Source id
b) Sequence number
c) Destination id
d) Receiver id
17. In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the
availability of a partial path to destination is intimated to theTCP-BuS sender through an ……
18. Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced
services,high scalability, easy extensibility, high availability & low cost per bit.
a) Military applications
b) Emergency Operation
b) Ad Transfer Protocol
a) Bandwidth allocation
b) end-to-end delivery of data packets
c) Path finding
d) Speed of transmission
21. One advantage that DSR has over DSDV due to its on-demand nature.
23. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks
a) Passive Atttack
b) Active Attack
c) Snooping
d) Jamming
24. The attack effected by making the network resource unavailable for service to other nodes, either by
consuming the bandwidth or by overloading the system, is known as …..
a) Denial of service
b) Host impersonation
c) Information disclosure
d) Interference
25. The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously
made throughout the network and no ordering among nodes is followed.
a) "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"
b) "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless
network "
c) "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "
d) "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the
impending DATA packets"
c) Packet replication
a) TKIP
b) SAP
c) DOA
d) TKP
d) Processing Utilization
30. In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes
present in the network.
d) Packet replication
31. Which one is the first protocols proposed for adhoc wireless networks?
32. In RI-BTMA the data packets are divided into two portions a _________ and actual data packets.
a) Asynchronous
b) Synchronous
c) Preamble
d) Free
34. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks.
a) Passive Atttack
b) Active Attack
c) Snooping
d) Jamming
35. In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………
36. In which protocol probability of colliision is very low but bandwidth utilization is very poor?
a) BTMA
b) FAMA
c) MARCH
d) PRMA
37. Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless
network?
b) Quality of Service
c) Throughput
d) Routing
38. The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple
access protocols in wired networks.
a) FAMA
b) BTMA
c) MACA
d) MACAW
39. Ad-hoc network connects each computer using which network topology?
a) Tree
b) Mesh
c) Star
d) Bus
40. In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the
availability of a partial path to destination is intimated to theTCP-BuS sender through an ……
41. Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced
services,high scalability, easy extensibility, high availability & low cost per bit.
a) Military applications
b) Emergency Operation
a) Bandwidth efficiency
a) Hybrid mechanisms
b) Forwardingbased
c) Disseminationbased
d) Priority-based
b) High scalability
c) Wired communication
d) Dedicated Bandwidth
47. ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for -------- .
a) Detection, avoidance and control of congestion
c) maximum delay
d) Processing Utilization
a) Adhoc sensors
b) Wired communication
c) Safety messages
d) Physical infrastrucute
a) Routing
b) Framing
c) Encoding
d) congestion control
51. A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.
a) MAN
b) WAN
c) LAN
d) None of these
53. In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes
present in the network.
d) Packet replication
54. In this attack, a malicious node falsely advertises good paths to the destination node during the
path-finding process or in the route update messages.
a) active Attack
b) Blackhole Attack
d) Wormhole attack
d) Finding Routes
a) 3 broad groups
b) 6 broad groups
c) 9 broad groups
d) 8 broad groups
a) Multiplexing/ Demultiplexing
d) Congestion control
59. Which one of the following would breach the integrity of a system?
a) Firewall
b) Gateway
c) Router
d) Virus checker
61. A network can receive a multicast packet from a particular source only through a
a) one to one
b) one to many
c) many to one
d) many to many
a) 1 always
d) "0" always
64. In Transmission Control Protocol (TCP), When a segment carries a combination of data and control
information, it uses a
a) port number
b) sequence number
c) slot number
d) source number
c) two-way handshaking
a) to alert drivers of traffic jams ahead, help balance traffic informing the
a) D-PRMA
b) MARCH
c) BTMA
d) MACA
70. Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?
a) MAC
b) MACAW
c) BTMA
d) PRMA
71. Which of the following protocol was developed with the main objective of supporting integrated
services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time
maximizing the statistical multiplexing gain?
72. In distance vector routing algorithm, the routing tables are updated …..
b) Automatically
d) By the Server
c) Synchronisation
a) TKIP
b) SAP
c) DOA
d) TKP
75. Two known attacks on WPA are ____________ and DOS attack.
a) Session Hijacking
b) Dictionary Attack
c) Rushing Attack
d) Jamming
----------Key----------
1. (a)
2. (a)
3. (a)
4. (c)
5. (a)
6. (a)
7. (a)
8. (a)
9. (c)
10. (a)
11. (c)
12. (b)
13. (b)
14. (b)
15. (c)
16. (b)
17. (d)
18. (d)
19. (a)
20. (b)
21. (b)
22. (a)
23. (d)
24. (a)
25. (a)
26. (c)
27. (a)
28. (a)
29. (d)
30. (c)
31. (b)
32. (c)
33. (a)
34. (a)
35. (a)
36. (a)
37. (a)
38. (c)
39. (b)
40. (d)
41. (d)
42. (a)
43. (c)
44. (d)
45. (b)
46. (d)
47. (a)
48. (d)
49. (c)
50. (d)
51. (c)
52. (b)
53. (c)
54. (a)
55. (a)
56. (a)
57. (a)
58. (d)
59. (b)
60. (a)
61. (d)
62. (b)
63. (c)
64. (b)
65. (a)
66. (a)
67. (a)
68. (a)
69. (a)
70. (a)
71. (a)
72. (a)
73. (c)
74. (a)
75. (a)