Adhoc

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

1. Which synchronization is essential to receive the messages in specific order.

a. Time
b. Global
c. Clock
d. Low power
2. Which sensor nodes are distributed randomly
a. Static
b. Movable
c. Both a and c
d. Neither of the above
3. What is the access point (AP) in a wireless LAN?
a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and wireless devices
itself
d) all the nodes in the network
View Answer
Answer: a
Explanation: Access point in a wireless network is any device that will allow the wireless devices
to a wired network. A router is the best example of an Access Point.
4. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
c) nodes are not required
d) all nodes are access points
View Answer Answer: a
Explanation: An ad-hoc wireless network is a decentralized kind of a wireless network. An access
one. Hence it is not required.
5. In wireless distribution system __________
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required
View Answer: a
Explanation: A Wireless Distribution System allows the connection of multiple access points
together. It is used to expand a wireless network to a larger network.
6. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
View Answer: c
Explanation: A wireless network interface controller works on the physical layer and the data
link layer of the OSI model. Infrastructure mode WNIC needs access point but in ad-hoc mode
access point is not required.
7. In wireless network an extended service set is a set of ________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
View Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN architecture and is used
to expand the range of the basic service set by allowing connection of multiple basic service
sets.
8. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
View Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded on multiple
carrier frequencies. It is also used in digital television and audio broadcasting in addition to
Wireless LANs.
9. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
View Answer: a
Explanation: Collision detection is not possible in wireless LAN with no extensions. Collision
detection techniques for multiple access like CSMA/CD are used to detect collisions in Wireless
LANs.
10. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for emails
View Answer: b
Explanation: WEP is a security algorithm for wireless network which intended to provide data
confidentiality comparable to that of traditional wired networks. It was introduced in 1997.
11. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) decrypted message
View Answer
Answer: a
Explanation: Cipher is a method to implement encryption and decryption of messages travelling
in a network. It’s used to increase the confidentiality of the messages.
12. In asymmetric key cryptography, the private key is kept by __________
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer
Answer: b
Explanation: The private key is kept only by the receiver of the message. Its aim is to make sure
that only the intended receiver can decipher the message.
13. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) dsa algorithm
View Answer: c
Explanation: Electronic code book algorithm is a block cipher method in which each block of text
in an encrypted message corresponds to a block of data. It is not feasible for block sizes smaller
than 40 bits.
14. In cryptography, the order of the letters in a message is rearranged by __________
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) quadratic ciphers
View Answer: a
Explanation: In transposition ciphers, the order of letters in a plaintext message is shuffled using
a pre-defined method. Some of such ciphers are Rail fence cipher and Columnar transposition.
15. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
View Answer: a
Explanation: DES is a symmetric key block cipher in which the block size is 64 bits and the key
size is 64 bits. It is vulnerable to some attacks and is hence not that popularly used.
16. Cryptanalysis is used __________
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) to make new ciphers
View Answer: a
Explanation: Cryptanalysis is a field of study in which a cryptographic scheme is intentionally
tried to breach in order to find flaws and insecurities. It is used to make sure that the scheme is
least vulnerable to attacks.
17. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
View Answer: b
Explanation: TLS has strong message authentication and key-material generation to prevent
eavesdropping, tampering and message forgery. It has been used since the year 1996.
18. Military vehicles on a battlefield with no existing infrastructure will deploy ............... network.
a.MANET
b.Cell Network
c.LAN
d.Wi-Fi
19. What is the type of network in which the topology change from time to time?
a.Wi-Fi
b.Cell Network
c.LAN
d.MANET
20. The processes that keep track of all mobile hosts visiting the area is .................
a.Home agent
b.Mobile agent
c.Foreign agent
d.User agentDdddd
21. The hosts which are basically stationary hosts who move from one fixed site to another from
time to time but use the network only when they are physically connected to it are
called ................
a.Migratory hosts
b.Stationary hosts
c.Mobile hosts
d.Random hostsDdddd
22. Fff
23. Fffff
24. fffff
a.Wi-Fi
b.Cell Network
c.LAN
d.MANET

20.

19.

You might also like