This set of Cognitive Radio Multiple Choice Questions & Answers (MCQs) focuses on “Next Generation Wireless Network – Cognition Policy Engine – 1”.
1. Which among the following is an important assumption while operating with the Policy Core Information Model?
a) No storage is necessary
b) Cooperative storage
c) Centralized storage
d) Distributed storage
Explanation: Policy Core Information Model utilizes a centralized database. The policy enforcement point sends a request for a policy decision to the policy decision point. The policy decision point obtains information from the centralized database to take policy decisions.
2. Which among the following is the first step in the operation of a cognition policy engine?
a) The cognitive engine transfers data to the policy engine
b) The policy engine requests data from cognitive radio
c) The policy engine obtains the set of policies to be downloaded
d) The policy engine determines the information of interest
Explanation: The first step in the operation of the cognition engine is to collect the set of policies to be downloaded for the operation of the radio. The policy next determines the information to be monitored on the radio platform. Then the cognitive radio grants the policy engine with the requested situational data. This results in the processing of appropriate policy rules.
3. The policy requests and decisions exchange between the policy decision point and policy enforcement point may be over common open policy service.
Explanation: The common open policy service belongs to the internet protocol suite. It offers a client/server model for providing policy control over the quality of service signaling protocols. The policy requests and decisions exchange between the policy decision point and policy enforcement point may be over common open policy service.
4. Which among the following statements is true about the spectrum policy management?
a) Eliminate cooperative sensing
b) Eliminates network administrators
c) Resolve conflicts in policy rules
d) Maintain homogeneity with legacy radios
Explanation: The spectrum policy management solves the conflicts in policy rule by identifying inconsistencies. It depends on the network administrators to determine the applicable spectrum policy for the spectrum environment, spectrum sharing mechanism, and other issues that arise due to cross layer design.
5. Which among the following is not a function of spectrum policy management?
a) Monitor spectrum utilization
b) Detect RF interference
c) Control run-time configuration of cognitive radio
d) Authorization of updates in cognitive radio
Explanation: Spectrum policy management analyses spectrum utilization and detects RF interference. The configuration of the cognitive radio during run time is controlled by spectrum policy management to meet the selected spectrum policies. However, it requires authorization to perform changes to the radio.
6. Which among the following preceded the DARPA NeXt Generation radio communication program?
a) FFC Policy-Based Survivable communication program
b) DARPA Policy-Based Survivable communication program
c) FCC Frequency Agile Radio
d) DARPA Frequency Agile Radio
Explanation: DARPA Policy-Based Survivable communication program preceded the development of DARPA NeXt Generation radio communication program. It provided high survivability in the military environment and better performance gain could be achieved by downloading dynamic mission policies to supervise the radio networks automatically.
7. Which among the following is not a goal of the DARPA NeXt Generation radio communication program?
a) Dynamically redistribute allocated spectrum
b) Sense spectrum automatically
c) Expand communication bandwidth
d) Select operating mode
Explanation: The DARPA NeXt Generation radio communication program aims to develop a radio with technology that can dynamically redistribute the available spectrum in radio networks, thereby making the best use of available communication bandwidth. The spectrum should be sensed automatically. The selected operating mode should maximize the survivability of communication networks and reduce the amount of interference to other users of the spectrum.
8. Which among the following languages initially influenced the KAoS policy language?
a) DARPA Agent Markup Language and Knowledge Query and Markup Language
b) DARPA Agent Markup Language and eXtensibleMarkup Language
c) DARPA Agent Markup Language and RoXenMarkup Language
d) eXtensible Markup Language and RoXenMarkup Language
Explanation: KAoS policy language expresses and applies policies in the software agent context. It was initially based on DARPA Agent Markup Language (DAML) and eXtensibleMarkup Language. But due to poor descriptive logic of DAML, KAoS shifted towards the Web Ontology Language to represent knowledge about domains and rule-based policies.
9. Which among the following is not a primary rule of role based access control?
a) Role definition
b) Role assignment
c) Role authorization
d) Permission authorization
Explanation: Role based access control is a mechanism that provides access depending on roles and the corresponding privileges and does not rely on policies. It can implement mandatory access control as well as discretionary access control. The following are the primary rules namely role assignment, role authorization, and permission authorization.
10. Which among the following protocol is employed management information base?
a) Telecommunications Network
b) Simple Network Management Protocol
c) Network File System
d) File Transfer Protocol
Explanation: The management information base is a device-specific database that uses the Simple Network Management Protocol (SNMP) for remotely managing a network resource on the basis of IP communications. The MIB should provide a standard interface for monitoring and configuring a device to gain the support of IP capable devices.
Sanfoundry Global Education & Learning Series – Cognitive Radio.
To practice all areas of Cognitive Radio, here is complete set of 1000+ Multiple Choice Questions and Answers.