Cognitive Radio Questions and Answers – Next Generation Wireless Network – Cognition Policy Engine – 1

«
»

This set of Cognitive Radio Multiple Choice Questions & Answers (MCQs) focuses on “Next Generation Wireless Network – Cognition Policy Engine – 1”.

1. Which among the following is an important assumption while operating with the Policy Core Information Model?
a) No storage is necessary
b) Cooperative storage
c) Centralized storage
d) Distributed storage
View Answer

Answer: c
Explanation: Policy Core Information Model utilizes a centralized database. The policy enforcement point sends a request for a policy decision to the policy decision point. The policy decision point obtains information from the centralized database to take policy decisions.
advertisement

2. Which among the following is the first step in the operation of a cognition policy engine?
a) The cognitive engine transfers data to the policy engine
b) The policy engine requests data from cognitive radio
c) The policy engine obtains the set of policies to be downloaded
d) The policy engine determines the information of interest
View Answer

Answer: c
Explanation: The first step in the operation of the cognition engine is to collect the set of policies to be downloaded for the operation of the radio. The policy next determines the information to be monitored on the radio platform. Then the cognitive radio grants the policy engine with the requested situational data. This results in the processing of appropriate policy rules.

3. The policy requests and decisions exchange between the policy decision point and policy enforcement point may be over common open policy service.
a) True
b) False
View Answer

Answer: a
Explanation: The common open policy service belongs to the internet protocol suite. It offers a client/server model for providing policy control over the quality of service signaling protocols. The policy requests and decisions exchange between the policy decision point and policy enforcement point may be over common open policy service.
advertisement
advertisement

4. Which among the following statements is true about the spectrum policy management?
a) Eliminate cooperative sensing
b) Eliminates network administrators
c) Resolve conflicts in policy rules
d) Maintain homogeneity with legacy radios
View Answer

Answer: c
Explanation: The spectrum policy management solves the conflicts in policy rule by identifying inconsistencies. It depends on the network administrators to determine the applicable spectrum policy for the spectrum environment, spectrum sharing mechanism, and other issues that arise due to cross layer design.

5. Which among the following is not a function of spectrum policy management?
a) Monitor spectrum utilization
b) Detect RF interference
c) Control run-time configuration of cognitive radio
d) Authorization of updates in cognitive radio
View Answer

Answer: d
Explanation: Spectrum policy management analyses spectrum utilization and detects RF interference. The configuration of the cognitive radio during run time is controlled by spectrum policy management to meet the selected spectrum policies. However, it requires authorization to perform changes to the radio.
advertisement

6. Which among the following preceded the DARPA NeXt Generation radio communication program?
a) FFC Policy-Based Survivable communication program
b) DARPA Policy-Based Survivable communication program
c) FCC Frequency Agile Radio
d) DARPA Frequency Agile Radio
View Answer

Answer: b
Explanation: DARPA Policy-Based Survivable communication program preceded the development of DARPA NeXt Generation radio communication program. It provided high survivability in the military environment and better performance gain could be achieved by downloading dynamic mission policies to supervise the radio networks automatically.

7. Which among the following is not a goal of the DARPA NeXt Generation radio communication program?
a) Dynamically redistribute allocated spectrum
b) Sense spectrum automatically
c) Expand communication bandwidth
d) Select operating mode
View Answer

Answer: c
Explanation: The DARPA NeXt Generation radio communication program aims to develop a radio with technology that can dynamically redistribute the available spectrum in radio networks, thereby making the best use of available communication bandwidth. The spectrum should be sensed automatically. The selected operating mode should maximize the survivability of communication networks and reduce the amount of interference to other users of the spectrum.
advertisement

8. Which among the following languages initially influenced the KAoS policy language?
a) DARPA Agent Markup Language and Knowledge Query and Markup Language
b) DARPA Agent Markup Language and eXtensibleMarkup Language
c) DARPA Agent Markup Language and RoXenMarkup Language
d) eXtensible Markup Language and RoXenMarkup Language
View Answer

Answer: b
Explanation: KAoS policy language expresses and applies policies in the software agent context. It was initially based on DARPA Agent Markup Language (DAML) and eXtensibleMarkup Language. But due to poor descriptive logic of DAML, KAoS shifted towards the Web Ontology Language to represent knowledge about domains and rule-based policies.

9. Which among the following is not a primary rule of role based access control?
a) Role definition
b) Role assignment
c) Role authorization
d) Permission authorization
View Answer

Answer: a
Explanation: Role based access control is a mechanism that provides access depending on roles and the corresponding privileges and does not rely on policies. It can implement mandatory access control as well as discretionary access control. The following are the primary rules namely role assignment, role authorization, and permission authorization.
advertisement

10. Which among the following protocol is employed management information base?
a) Telecommunications Network
b) Simple Network Management Protocol
c) Network File System
d) File Transfer Protocol
View Answer

Answer: b
Explanation: The management information base is a device-specific database that uses the Simple Network Management Protocol (SNMP) for remotely managing a network resource on the basis of IP communications. The MIB should provide a standard interface for monitoring and configuring a device to gain the support of IP capable devices.

Sanfoundry Global Education & Learning Series – Cognitive Radio.

To practice all areas of Cognitive Radio, here is complete set of 1000+ Multiple Choice Questions and Answers.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

advertisement
advertisement
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter