WIRELESS SENSOR NETWORKS (WSN)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

WIRELESS SENSOR NETWORKS


BOOST YOUR KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

+ S
5 7 ON
2 TI RS
ES WE
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 WIRELESS SENSOR NETWORKS . . . . . . . . . . . . . . . . . . . . . . . 2


1.1 WIRELESS SENSOR NETWORKS ............................. 2
1. WIRELESS SENSOR NETWORKS

NARAYAN CHANGDER
1.1 WIRELESS SENSOR NETWORKS
1. An attack does not disrupt the operation 4. How to save energy in wireless sensor
of the network networks?
A. Active A. It only takes two jumps to reach the
B. passive sink.
C. both B. Global knowledge of networking is not
required.
D. none of them
C. Grouping-A competitive mechanism.
2. What is meant by hosting? (3-6)
D. Multi-hop routing protocol.
A. A service that allows individuals and
organisations to make their website avail- 5. Events are communication packets that are
able onthe world wide web passed between consecutive layers within
B. A service that creates websites for , or between the across nodes.
companies
A. Two nodes, same layers
C. A service that transmits data in a net-
work B. One node, same layers

D. A service that translates alphabetic C. One node, different layers


names into IP addresses D. Two node, different layers
3. Which if these terms refers to the max-
6. What is meant by “uMAP” in Map-based
imum rate at which data can betrans-
World Model (MWM)?
ferred? (1-4)
A. Error detection A. Unifying Map

B. Packet switching B. User Map


C. Bandwidth C. Unified Modeling and Planning
D. Transmission media D. Uniform Mapping

1. B 2. A 3. C 4. C 5. B 6. B 7. A 7. B 7. C
1.1 WIRELESS SENSOR NETWORKS 3

7. Which of these are the objectives of net- 12. What is the new phase in M-SPIN
work security?
A. Error Discovery

PRACTICE BOOK» NOT FOR SALE


A. Identification
B. Route Discovery
B. Authentication
C. Distance Discovery
C. Access control
D. Lock D. Power Discovery

8. What is not included in the main function 13. Following are the types of routing on
of WSN is? MANET, except:
A. Raw data processing in networks A. Proactive Routing
B. Transport of actual information
B. Hybrid Routing
C. Sampling physical phenomena
C. HyperActive Routing
D. Sensor hardware programming
D. Reactive Routing
9. Which one of the following is the Absolute
sensor 14. Carrier Sense Multiple Access (CSMA) is
A. Thermistor based on medium called
B. Thermocouple A. Listen and talk
C. Both Thermistor and Thermocouple B. Listen before sending
D. None of these
C. Sense before transmit
10. The following are the components that ex-
D. Sense before Collision
ist in each node in WSN
A. controller 15. What is the main objective of the Wireless
B. memory Sensor Network?
C. to eat A. To understand the consist of WSN pro-
D. sensors/actuators tocol and algorithms
E. a, b, d eat B. To analyze the performance and effi-
ciency of different WSN protocols and al-
11. What is the main principle of a Wireless gorithms
Sensor Network?
C. To distribute sensors ad hoc for data
A. Using a network of sensors to transmit
collection
data through cables
B. Collecting data from the environment D. To communicate using point-to-point
using a network of sensors and transmit- communication
ting it through radio signals
16. Wireless Network is
C. Using a network of sensors to collect
data from the environment and transmit- A. The network uses cables
ting it through satellite communication B. Wireless network
D. Collecting data from the environment
C. The network uses UTP cable
using a network of sensors and transmit-
ting it wirelessly D. The network uses cross cables

8. D 9. A 10. E 11. D 12. C 13. C 14. C 15. A 16. B 17. B


1.1 WIRELESS SENSOR NETWORKS 4

17. What is cloud computing? (1-4) 22. Contiki is designed to run on types of
hardware devices that are severely con-
A. Storing large amounts of data on a sin-
strained in
gle computer
A. Memory
B. Using the internet to store and access
data and programs remotely B. Power
C. Storing hard copies of data as a C. Processing power
backup D. All the above

NARAYAN CHANGDER
D. Using the internet to communicate 23. A sensor is a device used to detect the
with other users presence of other objects around it by
changing non-electrical quantities into elec-
18. What does TDMA stand for in the context
trical quantities.
of MAC protocols for wireless sensor net-
works? A. Correct
A. Time Division Multiplexing Access B. Salah

B. Total Data Management Algorithm 24. What is the concept of Web Censorship?
C. Transmission Data Modulation Array A. A concept that integrates various
maps and web-based real time sensor
D. Time Division Multiple Access
data
19. What are the classes of nodes in cooja sim- B. Instagram content filtering concept
ulator C. Concept of finding the best path
A. Emulated nodes D. Concept that integrates web services.
B. Cooja nodes
25. What is the main function of “nMAP”?
C. all of this above A. Describes the spatial and temporal dis-
D. none of this tribution of censored attributes in the
physical world
20. what are the requirements need for net- B. Represents the spatial and temporal
work security? behavior of system properties such as
A. confidentially residual energy and network connections
B. integrity C. Integrate user map and network map
C. all of this above D. Maximize reusability of concepts and
techniques
D. none of this
26. What are the key components of node ar-
21. How much data can a typical frame con- chitecture and network architecture in a
tain? wireless sensor network?
A. 2243 pixels A. Sensor, processor, memory,
transceiver, power supply, sink, base sta-
B. 768 bits
tion, gateway
C. 500 bytes
B. Keyboard, mouse, monitor, printer,
D. 1500 kilobytes scanner

18. D 19. C 20. C 21. C 22. D 23. A 24. A 25. B 26. A


1.1 WIRELESS SENSOR NETWORKS 5

C. Camera, microphone, speaker, projec- 32. Example of Event-Driven Model operating


tor, amplifier system in WSN is

PRACTICE BOOK» NOT FOR SALE


D. Antenna, satellite, router, modem, eth- A. Mantis OS
ernet cable
B. STRAIGHTS
27. What does scalable mean? C. TinyOS
D. None of these

33. What are some key features of NS2 exten-


sion to sensor networks?
A. Support for social media integration
A. It’s a very large network B. Support for various routing protocols,
energy models, and mobility models
B. It’s heavy on the scales.
C. Only Ad Hoc networks are scalable. C. Ability to generate weather forecasts

D. More devices can be added any time. D. Compatibility with virtual reality tech-
nology
28. An active attack attempts to alter or de-
stroy the data being exchanged in the net- 34. algorithms, which use the same key for en-
work, thereby disrupting the normal func- cryption and decryption is called
tioning of the network A. symmetric key
A. Active B. Asymmetric key
B. passive C. both
C. both
D. none of them
D. none of them
35. BLE is introduced with Bluetooth 4.0
29. Which one of the IEEE 802 committees is
tasked with the development of securitys- A. True
tandards? B. False
A. 802.10
36. Here are the types of AdHoc networks ex-
B. 802.16 cept:
C. 802.15 A. CAFE
D. 802.11 B. WANET
30. Digital signatures schemes are also based C. MANET
on public key encryption. D. VANET
A. true
37. What are the components of a typical sen-
B. false
sor node in a WSN?
31. Expand ARAN? A. Sensors, limited computation, and
A. authenticated routing for adhoc net- wireless communication
works B. High power consumption, global ID,
B. authorized routing for adhoc netwoks and extensive computation

27. D 28. A 29. D 30. A 31. A 32. C 33. B 34. A 35. A 36. A 37. A
1.1 WIRELESS SENSOR NETWORKS 6

C. Point-to-point communication, global B. Limited processing power


ID, and extensive computation C. High energy capacity
D. Sensors, extensive computation, and D. Stable environmental conditions
wired communication
43. Cryptography is specific to ad hoc wireless
38. Contiki can provide communication over networks.
IPv4, IPv6 and A. true
A. Ring Network Stack B. false

NARAYAN CHANGDER
B. Rime Network Stack
44. Encrypting messages through movement
C. Lime Network Stack of each letter a certain number of places
D. Rin Supreme Stack to the left in the alphabet
A. Cipher
39. A security protocol for ad hoc wireless net-
works should satisfy the following require- B. Key
ments. C. Policies
A. Confidentiality D. Strong Passwords
B. Integrity 45. Trying to access data by going through
C. Availability lists of possible passwords is called
D. All of them A. A Brute Force attack
B. Phishing
40. It help prevent attackers from monitoring
or recording traffic between resources and C. Blagging
computers. D. DOS attack
A. Data Encryption 46. Which of the following is/are essential
B. Firewall components of a sensor node?
C. Antivirus A. Sensing unit
D. none of above B. Processing unit
C. Transmitting unit
41. What is included in the quality of a Map-
D. All of the mentioned
based World Model (MWM)?
A. The ability to replace the physical 47. External attacks are carried out by nodes
world completely that do not belong to the network
B. The ability to reflect both the physical A. true
world and the network world B. false
C. Limitations in understanding situa- 48. Identify the features of TinyOS
tions and events in the real world
A. Completely non-blocking
D. Ability to reduce efficiency in the use
B. Programs are built out of software
of network resources
components
42. What is one of the challenges in designing C. Tasks are non-preemptive and run in
a WSN? FIFO order
A. Homogeneity of devices D. all the above

38. B 39. D 40. A 41. B 42. B 43. B 44. A 45. A 46. D 47. A 48. D
1.1 WIRELESS SENSOR NETWORKS 7

49. Wireless technology consists of hardware A. It is not user-friendly and difficult to


and software and is a short-range ra- use for research
dio link (distance within certain limits)

PRACTICE BOOK» NOT FOR SALE


B. It is too expensive for educational pur-
between computer devices, mobile de- poses
vices, smartphones, digital cameras, etc.
called C. It provides a platform for creating vir-
tual sensor networks and studying their
A. Wifi behavior.
B. Bluetooth D. It has no practical application in study-
C. WMAX ing sensor networks
D. WPAN 55. What is the main challenge in achieving
energy efficiency in Wireless Sensor Net-
50. Specification for a wireless LAN are called works?
A. Standard 802.Ezz A. Limited power supply for the sensor
B. Standard 802.3u nodes
C. Standard 802.3x B. Lack of skilled personnel for mainte-
nance
D. IEEE 802.11
C. Excessive data transmission
51. How many number of Bit bus used in LO- D. Interference from other wireless de-
TUS MOTE vices
A. 8
56. What is layer 5 of the OSI model?
B. 16
A. Presentation
C. 32
B. Session
D. 64
C. Transport
52. what are the main approaches to key man- D. Network
agement?
57. How can fault tolerance be achieved in ad
A. key predistribution hoc wireless sensor networks?
B. key transport A. Using only one sensor node for the en-
C. all of this above tire network
D. none of this above B. Ignoring error detection and correc-
tion
53. The plaintext is converted into ciphertext C. Not using any redundancy
by the process called
D. Using redundancy, error detection and
A. encryption correction, and self-healing algorithms
B. Decryption
58. What is network lifetime?
C. cryptography
A. Possibility to become cluster head.
D. none of them
B. Longer life time than LEACH.
54. How can NS2 simulation software be ben- C. Promising technique for lifetime exten-
eficial for studying sensor networks? sion.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 8

D. Energy is required in every small or 64. The power source can be classified into
large operation in any type of application. three categories, there are the three cat-
egories, except
59. Real-time scheduling allocates resources
to so that they can be finished early. A. Replenishable power resource
A. Less urgent tasks B. Non-Replenishable power source
B. More urgent tasks C. Regenerative power source

60. What is layer 1 of the OSI model? D. Everlasting power source

NARAYAN CHANGDER
A. Application 65. Feature of contiki are multitasking kernel,
B. Presentation screensaver
C. Data Link A. true
D. Physical B. false

61. What is the main idea behind the Rumor 66. The abbreviation “WSN” in the context of
Routing protocol? wireless sensor networks is:
A. Creating floods between events and A. Wireless Service Network
query floods
B. Wired Sensor Node
B. Using a centralized data naming
C. Web Security Notification
scheme
D. Wireless Sensor Network
C. Forming clusters to minimize energy
dissipation 67. Wireless Sensor Network consists of 3
D. Maintaining multiple paths between components including
source and destination A. software
62. How can the use of sleep scheduling help B. gateways
in improving energy efficiency in WSN?
C. protocol
A. By reducing the number of nodes in the
D. user
network
B. By using higher power consumption 68. Which of these is a benefit of cloud com-
modes for longer periods of time puting? (3-6)
C. By allowing nodes to enter low-power A. It can reduce costs for a company as
sleep modes when not in use, reducing they do not need to buy additional hard-
overall energy consumption. ware tostore data
D. By increasing the data transmission B. It is the cheapest option for a company
rate between nodes to store their data as they do not need to
pay forcloud computing
63. Components that function as an energy
source for the WSN system as a whole C. Data can be accessed anywhere as an
internet connect is not needed to access
A. Transceiver
dataand software stored in cloud comput-
B. Power source ing
C. Microcontroller D. Data will always be more secure in a
D. Power Supplay cloud computing system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 9

69. What are some common problems in wire- 74. Which of these are Ad Hoc networks?
less networks?

PRACTICE BOOK» NOT FOR SALE


A. Cluster head failure is a problem.
B. Energy is required in every small or
large operation in any type of application.
C. The sensor comes with a battery, but
this battery does.
A. WiFi
D. Grouping consumes a lot of energy.
B. Infrared
70. algorithms, which use two different keys C. Bluetooth
for encryption and decryption.
D. Royal Mail
A. symmetric key
B. Asymmetric key 75. The technique that makes possible the task
of listening and talking in communication
C. both system is called
D. none of them A. Simplexing
71. Can adHoc networks be used by multiple B. Duplexing
devices? Why? C. Modulating
A. It can’t, because adHoc is one of the D. Multiple access technique
WLAN networks
B. Yes, because ad hoc is a WLAN net- 76. The simulator NS2 is a open source net-
work work simulator that was originally de-
signed for
C. Yes, because adHoc is a WAN network
A. Wired Networks
D. It can’t, because adHoc is a WAN net-
B. Wireless Networks
work
C. Hybrid Networks
72. A is an encryption scheme in which the
D. none of above
plaintext is broken into fixed-length seg-
ments called blocks 77. It is a kind of threats that targets failing
A. block cipher or disabling network services:
B. stream ciphers A. Unauthorized access
C. both B. Man in the middle attack
D. none of them C. Denial of service
D. war drivers
73. attacks are from compromised nodes
that are actually part of the network. 78. Identify the sensor used in automobiles
A. External A. Light sensor
B. Internal B. Position sensor
C. both C. Speed sensor
D. none of them D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 10

79. Identify the sensor which are used in 84. Network Security provides authentication
smartphone and access control for resources.
A. Proximity sensor A. True
B. Gyro sensor B. False
C. Both a and b 85. What are the main components of a sensor
D. None of these node?
A. sensor, receiver, battery, processor

NARAYAN CHANGDER
80. Which one of the following is not a compo-
nent of sensor node B. sensor, microcontroller, transceiver,
power source
A. Microcontroller
C. actuator, circuit board, modem, solar
B. Transistor panel
C. External memory D. camera, memory, antenna, display
D. Power Source
86. On-Demand Routing Protocol examples
81. How can physical layer attacks affect the are follows, except
functioning of wireless sensor networks? A. AODV
A. By improving the transmission of B. DSR
data and communication between sensor C. TORA
nodes
D. LAR
B. By increasing the security of the sen-
sor nodes E. CGSR

C. By reducing the power consumption of 87. What is meant by “autonomy” in the con-
sensor nodes text of Wireless Sensor Network (WSN)
D. By disrupting the transmission of deployment?
data and communication between sensor A. Deployment of sensor nodes by users
nodes B. Automatic deployment of mobile nodes
based on objective function
82. What does OUI stand for?
C. Manual deployment of static nodes
A. organizationally unique identifier
D. Node deployment based on low-level
B. organization unicorn identity design
C. ominous ubiquitous inquiry
88. What does NIC stand for?
D. oreos under igloos
A. Network Interface Card
83. The medium access control (MAC) is a sub- B. Network Interconnect Card
layer Of
C. Network Interchange Card
A. data link layer
D. Network Integrated Card
B. network layer
89. TinyOS provides for common abstrac-
C. physical layer
tions such as packet communication, rout-
D. application layer ing, sensing, actuation and storage.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 11

A. interfaces B. Mobility management Plane


B. components C. Process Management Plane

PRACTICE BOOK» NOT FOR SALE


C. Both a and b D. Both a and c
D. None of these above 95. BLE features
90. One of the classifications of scenarios in A. Low cost
gMAP where the mobility of the assis- B. long battery life
tance nodes can be controlled and the spa-
tial distribution of sensor nodes is known C. difficult to deploy
a priori is D. all of the above
A. Structured scenarios
96. What is a sensor node?
B. Unstructured scenarios
A. A type of fruit that grows on trees
C. Scenario without node mobility
B. A musical instrument that produces
D. Random scenario sound
91. Which of the following is a technique to C. A type of clothing worn by athletes
mask the source IP address of a network D. A device that gathers data from the en-
attack? vironment and transmits it to a central lo-
A. DDoS cation.
B. Replay 97. One of the classifications of scenarios in
C. Sniffing gMAP where the mobility of the assis-
tance node cannot be predicted is
D. Spoofing
A. Structured scenarios
92. FSM stands for B. Semi-structured scenarios
A. Finite slow machine C. Unstructured scenarios
B. Finite state machine D. Extreme scenario
C. Final state machine
98. What is one way to conserve energy in
D. Final slow machine sensor networks?
93. What does CSMA stand for in the context A. Keep the transceiver on at all times
of MAC protocols for wireless sensor net- B. Use longer data packets for communi-
works? cation
A. Centralized Sensor Monitoring Algo- C. Turn off the transceiver when not
rithm needed
B. Collision Sensing Multiple Antennas D. Increase the number of nodes in the
C. Controlled Signal Modulation Array network
D. Carrier Sense Multiple Access 99. Contiki OS has been especially developed
94. Which one of the following is not the cross for apps.
layer of sensor layer network architecture A. Powerless WSN
A. Energy management Plane B. High-powered WSN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 12

C. Low-powered WSN 105. What are the potential risks of not hav-
D. none of above ing fault tolerance in ad hoc wireless sen-
sor networks?
100. Which one of the following is the direct A. Increased data security
sensors
B. Enhanced network stability
A. Thermocouple
C. Improved communication reliability
B. Fiber optic displacement sensor
D. Potential risks include data loss, net-

NARAYAN CHANGDER
C. Both of them
work partitioning, and unreliable commu-
D. None of these nication.
101. What is meant by Transmitter? 106. Sensor Network is
A. Tools for moving and filtering informa- A. Heterogeneous system consisting of
tion tiny sensors
B. Ways to connect Source and Destina- B. Homogeneous system used in wire-
tion less
C. Signal receiving device from the Trans- C. Very important for security
mission System
D. All of the mentioned
D. Origin/sender of data
E. Purpose of sending data 107. What contains 4 pairs of wires that can
transmit and receive data?
102. Ad-hoc network to connect each computer A. UTP
using network topology
B. Physical layer
A. Three
C. Auxillary cables
B. Star
D. Coaxial cables
C. Mesh
D. Bus 108. A is used to separate a local network
from the outside world.
103. How would you describe the challenges
A. firewall
in wireless sensor networks to a friend?
B. antivirus
A. Energy efficiency, data security, net-
work scalability, and communication reli- C. gateway
ability D. none of them
B. Size of the sensors
109. Firewall is a software which works
C. Number of sensors in the network closely with a router program and filters
D. Color of the sensors A. true
104. Pick the Ad Hoc Network example. B. false
A. Tethering and personal hotspots. 110. Which of the following elements is most
B. Open WiFi likely to be an issue for Ping flood?
C. Personal Area Networks A. Confidentiality
D. Bluetooth B. Integrity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 13

C. Availability C. Hybrid
D. Non-repudiation. D. Firmware

PRACTICE BOOK» NOT FOR SALE


111. Which of these is a correct definition of 115. What are the advantages of WSN com-
DNS? (6-9) pared to traditional network techniques?
A. An internet service that is used to de- A. Increased efficiency and reduced envi-
tect errors ronmental impact
B. An internet service that stores data in B. Enhanced security and infrastructure
large quantities for different companies protection
C. An internet service that provides a C. Improved healthcare services and
messaging service for users to communi- smart transportation
cate
D. All of the above
D. An internet service that translates al-
phabetic names into IP addresses 116. Data being transported on a network.

112. What differentiates a mobility approach A. data


in WSN deployment from a static ap- B. traffic
proach?
C. packet
A. Limited user flexibility
D. none of above
B. Reliance on low-level design
C. User autonomy and flexibility 117. What is the purpose of application devel-
opment for wireless sensor networks?
D. Lack of cooperation between mobile
nodes and static nodes A. To bake cookies
B. To play music
113. What are the key considerations when
developing applications for wireless sen- C. To control traffic lights
sor networks? D. To collect, process, and transmit data
A. Weather patterns, animal migration, from the sensors
and geological formations
118. IEEE 802.15 for creating
B. Color scheme, font size, and button
A. Wireless Private Area Networks
placement
C. Social media integration, virtual real- B. Short range
ity, and artificial intelligence C. Low cost
D. Power consumption, data transmis- D. All of the above
sion, network topology, security, and scal-
ability 119. External attacks can be prevented by us-
ing standard security mechanisms like
114. The term for technology that utilizes mo-
A. encryption
bile devices to exchange data wirelessly
is B. firewalls
A. Wi-fi C. both
B. To this D. none of them

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 14

120. Which Bluetooth protocol performs link 125. Contiki OS is developed for
setup, authentication, link configuration, A. Internet of Things (IoT)
and the discovery of other Bluetooth de-
vices? B. Big Data

A. LMP C. Machine Learning

B. L2CAP D. none of above

C. Radio 126. stream delivery problem, a finite data


blocking comprising multiple packets must

NARAYAN CHANGDER
D. SAY
be delivered to sensor or a st of sensors
121. In the context of mobile wireless net- A. true
works, what is the most appropriate ab-
B. false
breviation for mWSN?
A. Mobile Wireless Sensor Network 127. Why is self-organization considered a
key aspect of Wireless Sensor Networks
B. Managed Wireless Sensor Network
(WSN)?
C. Mobile Wireless Signal Network
A. Because it produces low scale
D. Mobile Wireless Service Network
B. Because it limits adaptability
122. allows the system to fall into low- C. Because it increases adaptability to
power sleep mode when no interesting changing conditions
events need to be processed.
D. Because it limits scalability
A. Event-driven exemption
128. are small amounts of information
B. Event-driven execution
used by the cryptographic algorithms.
C. Event-driven encapsulation
A. plaintext
D. Event-driven encryption
B. cipher text
123. Why is security important in ad hoc wire- C. Keys
less sensor networks?
D. none of them
A. To make the network slower and less
efficient 129. The following is an example of an appli-
cation in a wireless sensor network
B. To allow easy access for hackers and
unauthorized users A. Transportation
C. To protect sensitive data and prevent B. Agricultural sector
unauthorized access or tampering. C. a, b, c benar
D. To increase the risk of data breaches D. Environmental sensing
and security threats
130. One category of information that has
124. What is one of the future applications of a collection of information from different
wireless sensor networks? sensor nodes but no redundancy is called?
A. Controlling electrical devices in homes A. Atomic information
B. Monitoring weather patterns B. Replicated atomic information
C. Detecting earthquakes C. Combined information
D. Tracking space missions D. Separate information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 15

131. What are the execution model C. FM


A. cycle driven simulation D. SM

PRACTICE BOOK» NOT FOR SALE


B. discrete event simulation
137. Which category does the application of
C. all of this above WSN for precision agriculture fall into?
D. none of this A. Object monitoring
132. A standard Contiki configuration for a mi- B. Area monitoring
crocontroller is and 40 KB ROM
C. Both area and object monitoring
A. 12KB RAM
D. None of the above
B. 22KB RAM
C. 2KB RAM 138. What is the goal of developing a Map-
based World Model (MWM) for Wireless
D. 21KB RAM
Sensor Networks (WSNs)?
133. A repeater is a piece of hardware whose A. Replaces existing design methodolo-
role is to gies
A. Receive signals from transmitting de- B. Increase the efficiency and level of ab-
vices to the client area straction of existing designs
B. Strengthen the signal C. Simplifies network and node re-
C. Controlling signals sources
D. Generates signals D. Models the physical world without con-
sideration of network resources
134. Which one of the following interface used
by TOSSIM 139. What one of the main operations of a
A. C++ Wireless Sensor Network (WSN) is
B. Python A. Generates complex sensor data
C. Both a and b streams
D. None of these above B. Create appropriate minimal sensor
data streams
135. If no proper authentication mechanism is
C. Ignores sensor data flow
used, an intruder would be able to join
into the network quite easily and carry out D. Extracting irrelevant information
his/her attacks.
140. What is it called when a NIC attaches to
A. true
a frame when it wants every other NIC on
B. false the network to read it?
136. covers all extreme cases:unreliable A. Broadcast address
communication channels, long delays, ir- B. Biometric binding
regular arrival of messages, simultaneous
events etc. C. IP address
A. SFM D. Network reader
B. FSM E. Comcast communicator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 16

141. What is the main objective of Wireless C. They are designed for different pur-
Sensor Network (WSN) as an event ser- poses.
vice? D. They both require a central control unit
A. Tracking Targets
146. What are the key design principles of the
B. Detecting Events gMAP approach?
C. Both of them A. Increase communication speed
D. There is no right answer B. Leveraging node mobility to transport

NARAYAN CHANGDER
messages and gather information in a
142. What are the potential consequences of delay-tolerant manner
a network layer attack in wireless sensor
networks? C. Reduces node mobility to save power
D. Schedule real-time message delivery
A. Data interception, unauthorized ac-
cess, and network congestion 147. How can application development for
B. Hardware failure, software corruption, wireless sensor networks contribute to
and data encryption solving real-world problems?
C. Firewall breach, server overload, and A. By increasing the cost of data collec-
software malfunction tion
D. Physical damage, power outage, and B. By making it harder to access real-
data loss world data
C. By causing more environmental dam-
143. What are some strategies for implement- age
ing fault tolerance in ad hoc wireless sen-
D. By enabling the collection, analysis,
sor networks?
and action based on data from the phys-
A. Static routing protocols ical world.
B. Data encryption 148. How do sensor nodes communicate in a
C. Single point of failure wireless sensor network?
D. Redundancy, error detection and cor- A. Infrared signals
rection, and dynamic routing protocols B. Bluetooth signals
144. Which phase of the LEACH protocol in- C. Ethernet cables
volves the selection of cluster heads? D. Radio frequency signals
A. Set-up phase 149. What problem can occur through using
B. Stabilization phase cloud computing? (3-6)
C. Both set-up and stabilization phases A. There can be privacy and security is-
sues
D. Neither set-up nor stabilization phase
B. More hardware needs to be added to
145. In what ways are wireless sensor net- a company network to store data
works different from ad hoc networks?
C. Only a small amount of data can be
A. They have the same range of coverage stored
B. They use the same type of communica- D. Only a small amount of software can
tion protocols be stored

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 17

150. Wireless networks are highly vulnerable 156. Expand CG


to security attacks compared to wired net- A. collaboration group
works

PRACTICE BOOK» NOT FOR SALE


B. co-located group
A. true
B. false 157. technologies modularize the operat-
ing system so that only the necessary
151. Which of the following is a characteristic parts are deployed with the application.
of reliable communication between sensor
A. Microcontroller
nodes?
B. Microkernel
A. Sending data only when the destina-
tion node is ready C. Microelectrostatic
B. Allowing collisions between nodes D. Microsystem
C. Having idle-listening and overhearing 158. A topology that allows sending data from
in the network one node to another node in the net-
D. Using multi-hop data transfer work within its radio transmission range
or multi-hop communication is
152. Expand PIECES?
A. Star
A. programming and interaction environ-
ment for collaborative embedded systems B. Tree
B. programming and information environ- C. Mesh
ment for collection embedded system D. Hybrid
153. What is a physical layer attack in wire- E. Ring
less sensor networks?
159. What is one of the major achievements in
A. Interfering with the network’s soft- energy efficiency for wireless sensor net-
ware works?
B. Manipulating physical signals or hard- A. DEEC protocol
ware components
B. NEW algorithm
C. Sending malicious software to the net-
work C. LECH protocol

D. Hacking into the network’s database D. HEED algorithm

154. What are three lack of this simple ap- 160. The advantages of a network topology
proach cause to be lacking as a protocol using a wireless router are
for sensor network A. Cheaper
A. Resource Blindness B. Simpler
B. Implosion C. More complicated
C. Overlap D. More expensive
D. none of above
161. Tossim is which is mostly deployed,
155. Interfaces are and contain both designed for testing WSN Protocols
A. Bidirectional, commands and events A. Discrete event simulator
B. Unidirectional, commands and events B. Dynamic event simulator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 18

C. Both a and b 166. Describe the important design principles


D. None of these above for wireless sensor networks in simple
terms.
162. What is Bluetooth? A. Energy efficiency, scalability, robust-
ness, and security
B. Complexity, low power consumption,
and limited range
C. Speed, flexibility, and simplicity

NARAYAN CHANGDER
D. Reliability, high cost, and low coverage

A. Long range technology. 167. What is meant by a data packet? (6-9)


B. Short range technology that connects A. A unit of data that travels along a net-
multiple devices. work
C. A personal area network. B. The number of error found in data
when it has been transmitted
D. Gum disease.
C. The data a computer needs to connect
163. Performs a ‘barrier’ between a potential to a network
attacker and the computer system D. A connection point in a network that al-
A. Packet sniffing lows data to be shared
B. Firewalls 168. Contiki OS is an open-source operating
C. Brute force attacks system and LINUX based
D. SQL injection A. TRUE

164. It is the application of the MANET, ex- B. FALSE


cept: 169. Which routing protocol is based on ge-
A. Military applications and Emergency ographic information and energy aware-
Operations ness?
B. Wireless Sensor Network A. Directed Diffusion
C. Wired Sensor Network B. Rumor Routing
D. A Wireless Mesh Network C. LEACH
D. TTDD
165. What are some of the challenges faced
in the introduction of wireless sensor net- 170. What is meant by a virtual network? (3-
works? 6)
A. Communication, power consumption, A. A network that is controlled by a cen-
security, and scalability tral server
B. Sensor placement, data accuracy, and B. A network that is used only to share
network coverage software
C. Hardware compatibility, signal inter- C. Controlling computers and devices re-
ference, and cost motely using the internet
D. Weather conditions, data storage, and D. A network that is built using only wire-
network speed less connection points

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 19

171. which type of authentication is least se- A. Exploiting vulnerabilities in the commu-
cure nication between sensor nodes and the
data link layer protocols

PRACTICE BOOK» NOT FOR SALE


A. PIN
B. Interfering with the physical layer of
B. Password
the sensor nodes
C. passphrase C. Attacking the network layer by flood-
D. finger print scan ing the sensor nodes with excessive traf-
fic
172. What are some common techniques used
D. Exploiting vulnerabilities in the applica-
to reduce energy consumption in WSN?
tion layer protocols
A. Constantly keeping all nodes active
177. Task-Rather than performing a compu-
B. Increasing data transmission tation immediately, commands and event
C. Data aggregation, duty cycling, and us- handlers may post a task.
ing energy-efficient protocols A. TRUE
D. Using outdated and inefficient proto- B. FALSE
cols
178. What is an Ad Hoc network?
173. Components that function to perform cal-
culations, control and process devices con-
nected to the microcontroller are
A. Transceiver
B. Power source
C. Microcontroller
D. Power Supplay A. A wireless network that doesn’t rely
on cables.
174. What is layer 7 of the OSI model?
B. An old traditonal network that uses ca-
A. Application bles.
B. Presentation C. A network of iPads.
C. Session D. Mobile Internet for example 4G.
D. Transport 179. What are the advantages of using TDMA
MAC protocol in wireless sensor net-
175. The AODV indicates the end node in the works?
case of link break with
A. Increased interference and reduced
A. hop count set to “0 bandwidth
B. table entries reset to “0 B. Efficient use of bandwidth and reduced
C. hop count set to “∞” interference
C. No impact on interference and band-
D. hop count set to “-1”
width usage
176. Explain a data link layer attack in the con- D. Inefficient use of bandwidth and in-
text of wireless sensor networks. creased interference

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 20

180. Establishing a user’s identity is called? C. Planning the shortest path


A. Security D. Looking for the longest path
B. Authentication
186. What is one of the advantages of cluster-
181. How is energy consumed in sensor ing in wireless sensor networks?
nodes?
A. Increased energy efficiency
A. Energy is required in every small or
B. Higher bandwidth communication
large operation in any type of application.

NARAYAN CHANGDER
B. Energy conservation-A big challenge. C. Unlimited storage capacity
C. Distributed Energy-Efficient Clustering D. Reduced node failure rate
Algorithms.
187. Which one of the following is not the fea-
D. Multi-hop routing protocol. tures of WSN
182. What are sets of clearly defined rules, A. In WSN the data moves from many
regulations, standards, and procedures nodes to the Gateway
that enable hardware and software de-
B. No unique id is used in the network
velopers to make devices and applica-
tions that function properly at a particular C. Unique id is used in the network
layer?
D. None of these
A. Protocol
B. TCP/IP 188. Name one example of an application that
can be developed for a wireless sensor net-
C. Networks work.
D. Interconnection
A. Online shopping app
183. How to extend the life of the network? B. Environmental monitoring
A. Grouping consumes a lot of energy. C. Video streaming service
B. Cluster head failure is a problem.
D. Social media platform
C. Shortest path routing.
D. Better combination of DEEC Clustering 189. WSN concept is the network of devices
and Multi hop. that connected together in order to share
and gather information
184. What does “MWM” mean?
A. True
A. Multi-World Model
B. False
B. Map World Model
C. Map-based World Model 190. The process of distributing keys to all in-
terested parties before the start of com-
D. Multi-User World Model
munication is called
185. Path planning in the gMAP approach in- A. key transport
volves the following steps, except:
B. key predistribution
A. Find the appropriate breakpoint
C. key arbitration
B. Reduce Overlap in communication
range D. key agreement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 21

191. TinyOS is an embedded, component- 196. TinyOS has a component-based program-


based operating system and platform for ming model, codified by the , a dialect
wireless devices of C.

PRACTICE BOOK» NOT FOR SALE


A. low-power A. JAVA language
B. low bandwidth B. C language
C. low-cost C. C++ language

D. both a and b D. NesC language

197. Select the objects that make up a tradi-


192. Cryptography is one of the most common
tional network.
and reliable means to ensure security.
A. Computers
A. true
B. Cables and wires.
B. false
C. Mobile phones and tablets.
193. What are the design principles that are D. Routers
important in the context of wireless sen-
sor networks? 198. What two types of connectivity can net-
works make use of?
A. Fundamental design principles such as
energy efficiency, scalability, robustness, A. Bluetooth and infrared
and self-organization. B. Wired and wireless
B. Colorfulness, flexibility, adaptability, C. Blu-ray and DVD
and complexity D. none of above
C. Durability, aesthetics, portability, and
199. Contiki OS, which is based
connectivity
A. C programming language
D. Speed, size, weight, and cost
B. C++ Language
194. What factors influence the selection of C. JAVA Language
data paths on routing?
D. Python Language
A. Network traffic and network interfer-
ence 200. Sensor protocol for information via ne-
gotiation (SPIN) is a data centric protocol
B. Quality of network connections and
which is used in wireless Sensor network.
network connections
A. true
C. Number of networks used
B. false
D. All true
201. How does a wireless sensor network
195. What is MANET? compare to an ad hoc network?
A. Multiple and network A. Wireless sensor networks are only
used for military applications
B. Mobile ad hoc network
B. Ad hoc networks are designed for spe-
C. Main ad hoc network evaluation
cific applications, while wireless sensor
D. Multiple ad hoc network networks are more general-purpose

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 22

C. Wireless sensor networks are more 206. BLE uses band


expensive than ad hoc networks A. 2.4 GHZ
D. Wireless sensor networks are de- B. 3
signed for specific applications, while ad
C. 5.2
hoc networks are more general-purpose.
D. NONE OF THE ABOVE
202. Mention the most correct application of
WSN 207. What is meant by latency in the perfor-
mance of a network? (6-9)

NARAYAN CHANGDER
A. Temperature monitoring for automatic
A. The amount of time data takes to travel
AC settings
from the source to the destination
B. Providing automatic on and off times
B. The maximum rate that data can be
for wood carving machines
transferred at
C. Wireless network settings at 20% C. The number of errors that are found in
D. Automatic shutdown of water irriga- a data packet after transmission
tion D. The route a packet takes when it is be-
ing transmitted
203. What is layer 3 of the OSI model?
208. TinyOS is designed to support re-
A. Transport
quired by the networked sensors
B. Network A. concurrency intensive operations
C. Data Link B. Nonconcurrency intensive operations
D. Physical C. Both a and b

204. What is a wireless sensor network? D. None of these above

A. A network of spatially distributed sen- 209. Block delivery problem, a finite data
sors that communicate wirelessly blocking comprising multiple packets must
be delivered to sensor or a st of sensors
B. A network of sensors that communi-
cate through carrier pigeons A. True

C. A network of sensors that communi- B. false


cate through smoke signals 210. Ad hoc wireless networks is a category
D. A network of sensors that communi- of wireless network which has a feature
cate through landline phones of network.
A. Infrastructure less
205. A device capable of converting one form
B. centralized control
of energy into another form of energy
C. single hop
A. Transceiver
D. Circuit switched network
B. Power source
211. The field that covers a variety of com-
C. Microcontroller
puter networks, both public and private,
D. Sensor that are used in everyday jobs.
E. External memory A. Artificial Intelligence

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 23

B. ML A. Provides better sampling details


C. Network Security B. Reduces the accuracy of the spatial

PRACTICE BOOK» NOT FOR SALE


D. IT distribution of sensor readings
C. Reducing communication efficiency in
212. The component that functions to re- Wireless Sensor Network (WSN)
ceive/send data using the IEEE 802.15.4
protocol to other devices such as concen- D. Abstracting from a single sensor node
trators, Wifi modems, and RF modems to address regions
is 217. Commands and events are mechanisms
A. Transceiver for communication, while tasks are
B. Power source used to express concurrency.
C. Microcontroller A. Inter-component, inter-component
D. Power Supplay B. Intra-component, intra-component
C. Intra-component, inter-component
213. Contiki directory in OS, also provides ac-
cess to system source codes, sample ap- D. Inter-component, intra-component
plication codes, practical applications, and
218. Identify which one of the following is not
driver codes for many node types, specific
the models of TinyOS
microcontroller files and important tools
like A. Data model
A. Pooja B. Thread model
B. Warm C. Programming model
C. Lame D. None of these above
D. Gaya 219. A denial of service (DoS) attacks can be
launched against any layer in the network
214. What is NS2 simulation software used
protocol stack.
for?
A. true
A. Cooking recipes
B. Network simulation B. false

C. Graphic design 220. Modules provide code and are written in


D. Weather forecasting a dialect of C and Configurations are used
to wire other components together
215. Providers of certain types of services on A. TRUE
a network are called?
B. FALSE
A. Routing
B. Database 221. Name one advantage of using a wireless
sensor network.
C. Corba
A. Limited coverage area
D. Server
B. One advantage of using a wireless sen-
216. What are the main benefits of Map- sor network is the flexibility and ease of
based World Model (MWM) based on the deployment without the need for exten-
explanation above? sive wiring.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 24

C. The high cost of maintenance and re- A. Byzantine attack


pair B. Information disclosure
D. Vulnerability to interference and hack- C. Blackhole attack
ing
D. Wormhole attack
222. I am easy to set up. All that is needed 228. Why is energy efficiency important in
are access points. WSN?
A. Wired A. To have no impact on the network life-

NARAYAN CHANGDER
B. Wireless time or battery replacements.
B. To prolong the network lifetime and
223. To strengthen the signal by receiving a
reduce the need for frequent battery re-
signal from a network segment and then
placements.
retransmitting it with the same strength
as the original signal on a different cable C. To increase the network lifetime and
segment, you can use require more frequent battery replace-
ments.
A. base transceiver
D. To decrease the network lifetime and
B. bridge increase the need for frequent battery re-
C. repeater placements.
D. mobile center 229. What is layer 2 of the OSI model?
E. Network Interface Card (NIC) A. Transport
224. IEEE 802.15.3 is faster than IEEE 802.15. B. Network
A. True C. Data Link
D. Physical
B. False
230. Explain the concept of node-level simula-
225. Which multiple access technique is used
tors.
by IEEE 802.11 standard for wireless
LAN? A. Node-level simulators simulate the be-
havior and interactions of individual nodes
A. CDMA in a network.
B. CSMA/CA B. Node-level simulators simulate the
C. Aloha movement of celestial bodies in space.
D. Non of the mentioned C. Node-level simulators simulate the
weather patterns in a specific area.
226. The full form of SSL is
D. Node-level simulators simulate the be-
A. Serial Session Layer havior of individual animals in a forest.
B. Secure Socket Layer 231. security protocol for ad hoc wireless is a
C. Session Secure Layer very challenging because of
D. Series Socket Layer A. shared broadcast radio channel
B. insecure operatingenvironment
227. A compromised node may leak confiden-
tial or important information to unautho- C. lack of central authority
rized nodes in the network is called D. All of them

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 25

232. Select the drawbacks of an Ad Hoc Net- C. By providing simulation tools and mod-
work els for performance analysis.

PRACTICE BOOK» NOT FOR SALE


A. They are less secure and more open to D. By providing weather forecasts for
attacks. sensor networks
B. Phones and other wireless devices can 238. What is layer 4 of the OSI model?
sign up.
A. Session
C. They have reduced speeds.
B. Transport
D. More unorganised.
C. Network
233. Which of these is a benefit of an Ad Hoc D. Data Link
Network
A. It’s a flexible network 239. The original information to be sent from
one person to another is called
B. They are less secure so more people
can access them. A. core data

C. They are very organised B. plaintext

D. Very high speeds. C. encoded data


D. cipher text
234. Attacks on ad hoc wireless networks can
be classified into two broad categories, 240. Data transmitted over a network is bro-
namely, passive and active attacks ken down into “ “
A. true A. Packets
B. false B. Sections

235. What does MAC stand for? C. Blocks

A. media access control D. Network Points

B. multi access control 241. Which one of the following is not the
C. media account control properties of leach protocol

D. multi address control A. It is a 2-tier hierarchy clustering archi-


tecture.
236. Byzantineattack, a intermediate node or B. It is a distributed algorithm for orga-
set of compromised intermediate nodes nizing the sensor nodes into groups called
works in collusion and carries out attacks. clusters.
A. true C. Both a and b
B. false D. None of these
237. How does NS2 contribute to the perfor- 242. The sensor network architecture is
mance analysis of sensor networks?
A. cluster
A. By analyzing social media data for sen-
sor networks B. layer

B. By conducting physical experiments on C. a and b are true


sensor networks D. a and b are wrong

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 26

243. internal attacks are more severe and dif- 248. A wireless access mode that has clients
ficult to detect when compared to external communicate with each other without the
attacks user of a wireless access point.
A. true A. decentralized LAN
B. false B. ad-hoc mode
C. wireless mesh
244. An algorithm in encryption is called
D. none of above

NARAYAN CHANGDER
249. Sending requests to a single server using
hijacked machines is an example of [1-
3]
A. Phishing
A. Algorithm B. DDOS
B. Procedure C. Worm
C. Cipher D. Virus
D. Module 250. What are the advantages of using energy
harvesting techniques in WSN?
245. The sensor that requires the external
power source for their functioning A. No impact on the lifespan of sensor
nodes
A. Resistive
B. Making the network less sustainable
B. Piezo electric crystal
C. Increasing the cost of sensor nodes
C. Both resistive and pieso electric crys- D. Prolonging the lifespan of sensor
tal nodes, reducing the need for battery re-
D. None placement, and making the network more
sustainable
246. Which technology is used in wireless sen-
sor networks? 251. Which of these is a benefit of virtual net-
work? (6-9)
A. Embedded systems
A. They have a higher level of security
B. Artificial intelligence than other remote connections
C. Virtual reality B. There is no need for any hardware to
D. Blockchain connect a computer to a network
C. There is no need for any software to
247. a malicious node tries to consume/waste connect a computer to a network
away resources of other nodes present in
the network. D. They stop any errors occurring in the
transmission of data in a network
A. Byzantine attack
252. What is one way to ensure security in an
B. Information disclosure
ad hoc wireless sensor network?
C. Blackhole attack
A. Leave the network open and unse-
D. Resource consumption attack cured

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.1 WIRELESS SENSOR NETWORKS 27

B. Share all network information publicly 257. What is layer 6 of the OSI model?
C. Use encryption and authentication pro- A. Spooky

PRACTICE BOOK» NOT FOR SALE


tocols B. Presentation
D. Use outdated security protocols
C. Session
253. In a table driven routing protocol, routes D. Transport
to all destinations are available at
A. every nodes periodically 258. What is streaming?

B. the source node at all times A. Data sent to a device in a constant flow
when on the internet
C. neighbor nodes only at all times
B. Throwing your tablet into a river.
D. every node at all times
C. Ad Hoc networks communicating to ea-
254. What are the three computational ab- chother.
stractions
D. 5 computers or more connected to a
A. Commands, control, communication traditional network.
B. Commands, events, tasks
259. Most key agreement schemes are based
C. Control, communication, tasks on asymmetric key algorithms
D. Control, capacity, tasks A. YES
255. Which is not a cause for undesired energy B. NO
wastage in WSNs?
260. Symmetric key algorithms donot rely on
A. Sensing of events
the presence of the shared key at both the
B. Idle listening sender and receiver.
C. Overhearing in case of densely de- A. true
ployed sensor networks
B. false
D. Collision of transmitted frames
261. Components that function as additional
256. The data sent by the source node should
memory for the WSN system
reach the destination node as it was sent
or unaltered is called A. Transceiver
A. Confidentiality B. Power source
B. Integrity C. Microcontroller
C. Availability D. Sensor
D. Non-repudiation E. Eksternal memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like