100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CS 6262 Network Security Quizzes with 100% Correct Verified Answers

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
07-09-2024
Written in
2024/2025

CS 6262 Network Security Quizzes with 100% Correct Verified Answers

Institution
CS6262
Course
CS6262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CS6262
Course
CS6262

Document information

Uploaded on
September 7, 2024
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CS 6262 Network Security Quizzes with
100% Correct Verified Answers
The following question is from the recommended reading "Exposing Private
Information by Timing Web Applications". Which of these are valid defense(s) by web
applications to resist timing attacks?


- Both the answer choices are correct
- Taking constant amount of time always for processing a request
- Adding random delay to the response - ANSWER Taking constant amount of time
always for processing a request


T/F: You are visiting a page that contains two iframes: http://example.com/ and
https://example.com/. They can access each other's content directly. - ANSWER False


T/F: HTTPS encrypts the host address to protect the user's privacy. - ANSWER False


T/F: From the paper "A Look Back at "Security Problems in the TCP/IP Protocol
Suite," it's safe to rely on the IP source address for authentication. - ANSWER False


T/F: In Steve Friedl's tech tips, he recommends people to run patched
servers. However, patched servers might still be vulnerable. - ANSWER True


Which of these is a TCP security problem:
- Eavesdropping
- Denial of service

, - Packet sniffing
- All of the above - ANSWER All of the above


T/F: TCP/IP packets are signed and not able to be forged or spoofed by the client -
ANSWER False


T/F: Randomizing just the initial sequence number completely prevents an attacker from
guessing the right sequence number. - ANSWER False


What is the purpose of BGP in the context of autonomous systems?
- To exchange routing information between autonomous systems
- To determine the routing policy within a domain
- To authenticate ARP requests in a network
- To secure routing protocols from hijacking - ANSWER To exchange
routing information between autonomous systems


T/F: A downside of using DNS Pinning as a defense against DNS Rebinding attacks is
that it makes the interaction with VPNs and proxies difficult. - ANSWER True


What are some of the things to consider when trying to meet the transparency
requirement for malware analysis?
Answers:
- Identical exception handling
- Identical notion of time
- Higher privilege than the malware
- All of the above - ANSWER All of the above


Which of the following is NOT an area of the C based toolchain where hardening can
occur.
- Assembler
- Compiler

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
KenAli West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
84
Member since
1 year
Number of followers
5
Documents
17177
Last sold
5 days ago

2.9

19 reviews

5
4
4
4
3
4
2
0
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions