0% found this document useful (0 votes)
89 views23 pages

Wanet Mid-2 MCQS

The document discusses various topics related to wireless ad-hoc networks including attack types, routing protocols, and medium access control protocols. It provides questions and answers on topics such as wormhole attacks, security aware AODV protocol, MAC protocol responsibilities, and advantages of wireless mesh networks.

Uploaded by

ARUNA GUDE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views23 pages

Wanet Mid-2 MCQS

The document discusses various topics related to wireless ad-hoc networks including attack types, routing protocols, and medium access control protocols. It provides questions and answers on topics such as wormhole attacks, security aware AODV protocol, MAC protocol responsibilities, and advantages of wireless mesh networks.

Uploaded by

ARUNA GUDE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

WIRELESS AD-HOC NEWORKS MID-II

1. In _________ attack, a malicious node falsely advertises good paths to the destination node during
the path-finding process.

a) Blackhole attack

b) Wormhole attack

c) Byzantine attack

d) Information disclosure

2. For forwarding data packet from one node to another following protocol in VANET can be used ---------
.

a) Delay Tolerant Network

b) TCP/IP

c) UDP

d) IP

3. In Security Aware AODV Protocol ------ .

a) the route discovery process is initiated by

b) the route discovery process is initiated by sending RTS

c) the route discovery process is initiated by

d) the route discovery process is initiated by

4. The network in which all the nodes are symmetric and there is no central control or hierarchy is

a) MANET

b) Client-Server Technology
c) Peer-to-Peer

d) VANET

5. Wormhole Attack ------ .

a) Receives packets at one location in the network

b) creates routing loops

c) selectively dropping packets

d) may leak confidential information to unauthorized-

6. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks.

a) Passive Atttack

b) Active Attack

c) Snooping

d) Jamming

7. In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a
____________________

a) Route failure notification (RFN) packet

b) Explicit route disconnection notification (ERDN) packet

c) Explicit link failure notification (ELFN) packet

d) Explicit route successful notification (ERSN) packet.

8. In which protocol probability of colliision is very low but bandwidth utilization is very poor?

a) BTMA

b) FAMA
c) MARCH

d) PRMA

9. In this ________ attack, an adversary node replicates stale packets.

a) Routing table poisoning

b) Route cache poisoning

c) Packet replication

d) Routing table overflow

10. Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless
network?

a) Distributed arbitration for the shared channel for transmission of packets

b) Quality of Service

c) Throughput

d) Routing

11. The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple
access protocols in wired networks.

a) FAMA

b) BTMA

c) MACA

d) MACAW

12. Ad-hoc network connects each computer using which network topology?

a) Three

b) Mesh
c) Star

d) Bus

13. What is the first step toward a QoS-aware routing protocol ?

a) Transmitting a packet

b) Finding the path

c) Round trip time

d) Reliability

14. In which protocol duration of RTS must be atleast twice the maximum channel propogation delay?

a) BTMA

b) FAMA

c) MARCH

d) PRMA

15. Which is not a type of Adhoc Wireless Routing Protocol Based on routing information?

a) Proactive Routing Protocol

b) Hybrid Routing Protocol

c) Power Aware Routing Protocol

d) Reactive Routing Protocol

16. In TCP-Bus, Route Notification includes the __________ of packet belonging to that flow in the head
of its queue.

a) Source id

b) Sequence number

c) Destination id
d) Receiver id

17. In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the
availability of a partial path to destination is intimated to theTCP-BuS sender through an ……

a) Route failure notification (RFN) packet

b) Explicit route disconnection notification (ERDN) packet

c) Explicit link failure notification (ELFN) packet

d) Explicit route successful notification (ERSN) packet.

18. Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced
services,high scalability, easy extensibility, high availability & low cost per bit.

a) Military applications

b) Emergency Operation

c) Wireless Sensor Network

d) Wireless Mesh Network

19. What does ATP stand for?

a) Ad Hoc Transport Protocol

b) Ad Transfer Protocol

c) Ad Hoc Transmission Protocol

d) Ad Hoc Transfer Protocol

20. The objectives of transport layer protocol include:

a) Bandwidth allocation
b) end-to-end delivery of data packets

c) Path finding

d) Speed of transmission

21. One advantage that DSR has over DSDV due to its on-demand nature.

a) New link is generated

b) Routing adapts to load

c) Sequence number is updated

d) No New link is generated

22. Wireless routing protocol is an example of _____________ .

a) Proactive routing protocol

b) Reactive routing protocol

c) Hybrid routing protocol

d) Source initiated Routing Protocol

23. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks

a) Passive Atttack

b) Active Attack

c) Snooping

d) Jamming

24. The attack effected by making the network resource unavailable for service to other nodes, either by
consuming the bandwidth or by overloading the system, is known as …..

a) Denial of service
b) Host impersonation

c) Information disclosure

d) Interference

25. The___________ protocol is fully distributed, that is, multiple reservations can be simultaneously
made throughout the network and no ordering among nodes is followed.

a) "Five Phase Reservation Protocols(FPR P)" "Reservation Necessary information to the receiver nodes"

b) "Media Access Protocol for Wireless LANs(MACAW)" "Protocol for Voice support in adhoc wireless
network "

c) "Busy Tone Multiple Access Protocols(BTM A)" "Multiple Access RTR packets transmitted by receiver "

d) "Distributed Packet Reservation Multiple Access" "Packet Protocol (D-Hidden terminals about the
impending DATA packets"

26. In this ________ attack, an adversary node replicates stale packets.

a) Routing table poisoning

b) Route cache poisoning

c) Packet replication

d) Routing table overflow

27. WPA uses ___________Algorithm to check integrity of the packets.

a) TKIP

b) SAP

c) DOA

d) TKP

28. Repudiation refers to the ------- .

a) attempted denial by a node involved in a communication


b) selection of node involved in a communication of having

c) selectively dropping packets

d) disrupt the normal operation of the network

29. Classification of routing protocol is based on _________ .

a) Routing information update mechanism

b) Protocol(DSDV) Routing topology

c) Utilization of specific resources

d) Processing Utilization

30. In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes
present in the network.

a) Routing table poisoning

b) Route cache poisoning

c) Routing table overflow

d) Packet replication

31. Which one is the first protocols proposed for adhoc wireless networks?

a) Wireless routing protocol(WRP)

b) Destination sequenced distance-vector routing

c) Source-tree adaptive routing protocol (STAR)

d) Dynamic source routing protocol (DSR)

32. In RI-BTMA the data packets are divided into two portions a _________ and actual data packets.

a) Asynchronous

b) Synchronous
c) Preamble

d) Free

33. Wormhole Attack ------ .

a) Receives packets at one location in the network

b) creates routing loops

c) selectively dropping packets

d) may leak confidential information to unauthorized-

34. Frequency hopping spread spectrum(FHSS) and direct sequence spread spectrum(DSSS) are
commonly use techniques to overcome __________ attacks.

a) Passive Atttack

b) Active Attack

c) Snooping

d) Jamming

35. In TCP-BuS, an intermediate node, upon detection of a path break, pivot node originates a ………………

a) Route failure notification (RFN) packet

b) Explicit route disconnection notification (ERDN) packet

c) Explicit link failure notification (ELFN) packet

d) Explicit route successful notification (ERSN) packet.

36. In which protocol probability of colliision is very low but bandwidth utilization is very poor?
a) BTMA

b) FAMA

c) MARCH

d) PRMA

37. Which is the primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless
network?

a) Distributed arbitration for the shared channel for transmission of packets

b) Quality of Service

c) Throughput

d) Routing

38. The ___________ protocol was proposed as an alternative to the traditional carrier sense multiple
access protocols in wired networks.

a) FAMA

b) BTMA

c) MACA

d) MACAW

39. Ad-hoc network connects each computer using which network topology?

a) Tree

b) Mesh

c) Star

d) Bus
40. In TCP-BuS, the Pivot node attempts to find a new partial route to the TCP-BuS receiver, and the
availability of a partial path to destination is intimated to theTCP-BuS sender through an ……

a) Route failure notification (RFN) packet

b) Explicit route disconnection notification (ERDN) packet

c) Explicit link failure notification (ELFN) packet

d) Explicit route successful notification (ERSN) packet.

41. Major advantage of __________ is for a high data rate, quick & low cost of deployment, enhanced
services,high scalability, easy extensibility, high availability & low cost per bit.

a) Military applications

b) Emergency Operation

c) Wireless Sensor Network

d) Wireless Mesh Network

42. Wireless routing protocol is an example of _____________ .

a) Proactive routing protocol

b) Reactive routing protocol

c) Hybrid routing protocol

d) Source initiated Routing Protocol

43. _____________is very important for bandwidth reservations by nodes.

a) Bandwidth efficiency

b) Quality of service support


c) Synchronisation

d) Hidden and ExposedTerminalProblem

44. Flooding-based mechanisms classified as ---- -

a) Hybrid mechanisms

b) Forwardingbased

c) Disseminationbased

d) Priority-based

45. Major advantage of Wireless Mesh Network is -----

a) Less physical infrastructure

b) High scalability

c) Wired communication

d) Dedicated Bandwidth

46. In TCP, when ATCP is in the DISCONNECTED state then --------- .

a) remains in normal state

b) remains in loss state

c) remains in congested state

d) remains in same state

47. ADHOC TRANSPORT PROTOCOL (ATP) uses information from lower layers for -------- .
a) Detection, avoidance and control of congestion

b) Successful delivery of the packet

c) maximum delay

d) provide simple feedback information

48. Classification of routing protocol is based on _________ .

a) Routing information update mechanism

b) Protocol(DSDV) Routing topology

c) Utilization of specific resources

d) Processing Utilization

49. Enhanced Distributed Channel Access (EDCA) allows ----- .

a) Adhoc sensors

b) Wired communication

c) Safety messages

d) Physical infrastrucute

50. What is the objective of a transport layer protocol?

a) Routing

b) Framing

c) Encoding

d) congestion control
51. A ________ broadcast storm occurs when broadcast or multicast packets flood the LAN.

a) MAN

b) WAN

c) LAN

d) None of these

52. In wireless ad-hoc network ____

a) Access point is must

b) Access point is not required

c) Nodes are not required

d) All nodes are access points

53. In __________ an adversary node advertises routes to non-existent nodes, to the authorized nodes
present in the network.

a) Routing table poisoning

b) Route cache poisoning

c) Routing table overflow

d) Packet replication

54. In this attack, a malicious node falsely advertises good paths to the destination node during the
path-finding process or in the route update messages.

a) active Attack
b) Blackhole Attack

c) Denial of Service Attack

d) Wormhole attack

55. Main function of Temporally ordered routing algorithm(TORA) is ------- .

a) Establishing, maintaining, and erasing routes

b) Efficiency, finding routes

c) Finding location, Relocating

d) Finding Routes

56. The wireless transmission is divided into ___________ .

a) 3 broad groups

b) 6 broad groups

c) 9 broad groups

d) 8 broad groups

57. What are the functions of the transport layer?

a) Multiplexing/ Demultiplexing

b) Connection less Services

c) Connection oriented service

d) Congestion control

58. Transmission control protocol ___________


a) is a connection-oriented protocol

b) uses a three way handshake to establish a connection

c) receives data from application as a single stream

d) all of the mentioned

59. Which one of the following would breach the integrity of a system?

a) Looking the room to prevent theft

b) Full access rights for all users

c) Fitting the system with an anti-theft device

d) Protecting the device against willful or accidental damage

60. Which software prevents the external access to a system?

a) Firewall

b) Gateway

c) Router

d) Virus checker

61. A network can receive a multicast packet from a particular source only through a

a) designated parent resolver

b) designated protocol router

c) designated parent table

d) designated parent router


62. In multicast communication, the relationship is

a) one to one

b) one to many

c) many to one

d) many to many

63. In Transmission Control Protocol (TCP), the numbering starts with a

a) 1 always

b) randomly assigned node

c) randomly generated number

d) "0" always

64. In Transmission Control Protocol (TCP), When a segment carries a combination of data and control
information, it uses a

a) port number

b) sequence number

c) slot number

d) source number

65. The connection establishment in Transmission Control Protocol (TCP) is called

a) three- way handshaking

b) three-way data transfer

c) two-way handshaking

d) two-way data transfer


66. A vehicular ad hoc network (VANET) can be used ----- loads, and

a) to alert drivers of traffic jams ahead, help balance traffic informing the

b) balance traffic loads, and reduce traveling time by

c) close the jam route

d) to observe the road to maintain street safty

67. The channel is divided into frames in ___________ .

a) D-PRMA

b) MARCH

c) BTMA

d) MACA

68. Which of the following protocol has no dedicated control channel?

a) Multichannel MAC Protocol

b) Interleaved Carrier-Sense Multiple Access Protocol

c) Receiver-Based Autorate Protocol

d) Power Control MAC Protocol for Ad Hoc Networks

69. Application Controlled Transport Protocol ---------

a) Provides freedom of choosing the required choosing the required

b) Is very compatible with TCP

c) Is very not compatible with TCP


d) is Less dependent on routing protocol

70. Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?

a) MAC

b) MACAW

c) BTMA

d) PRMA

71. Which of the following protocol was developed with the main objective of supporting integrated
services of real-time and non-Realtime applications in ad hoc wireless networks, at the same time
maximizing the statistical multiplexing gain?

a) Soft Reservation Multiple Access with Priority Assignment

b) Hop Reservation Multiple Access Protocol

c) Five-Phase Reservation Protocol

d) MACA with Piggy-Backed Reservation

72. In distance vector routing algorithm, the routing tables are updated …..

a) By exchanging information with the neighbors

b) Automatically

c) Using the Backup database

d) By the Server

73. _____________is very important for bandwidth reservations by nodes.


a) Bandwidth efficiency

b) Quality of service support

c) Synchronisation

d) Hidden and ExposedTerminalProblem

74. WPA uses ___________Algorithm to check integrity of the packets.

a) TKIP

b) SAP

c) DOA

d) TKP

75. Two known attacks on WPA are ____________ and DOS attack.

a) Session Hijacking

b) Dictionary Attack

c) Rushing Attack

d) Jamming

----------Key----------

1. (a)

2. (a)
3. (a)

4. (c)

5. (a)

6. (a)

7. (a)

8. (a)

9. (c)

10. (a)

11. (c)

12. (b)

13. (b)

14. (b)

15. (c)

16. (b)

17. (d)

18. (d)

19. (a)

20. (b)

21. (b)

22. (a)

23. (d)

24. (a)

25. (a)

26. (c)

27. (a)
28. (a)

29. (d)

30. (c)

31. (b)

32. (c)

33. (a)

34. (a)

35. (a)

36. (a)

37. (a)

38. (c)

39. (b)

40. (d)

41. (d)

42. (a)

43. (c)

44. (d)

45. (b)

46. (d)

47. (a)

48. (d)

49. (c)

50. (d)

51. (c)

52. (b)
53. (c)

54. (a)

55. (a)

56. (a)

57. (a)

58. (d)

59. (b)

60. (a)

61. (d)

62. (b)

63. (c)

64. (b)

65. (a)

66. (a)

67. (a)

68. (a)

69. (a)

70. (a)

71. (a)

72. (a)

73. (c)

74. (a)

75. (a)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy