100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CS 6250 Test 3 NEWEST 2025/2026 ACTUAL EXAM COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+||BRAND NEW!!

Puntuación
-
Vendido
-
Páginas
9
Grado
A+
Subido en
27-01-2025
Escrito en
2024/2025

CS 6250 Test 3 NEWEST 2025/2026 ACTUAL EXAM COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+||BRAND NEW!!

Institución
CS6250 COMPUTER NETWORK
Grado
CS6250 COMPUTER NETWORK









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CS6250 COMPUTER NETWORK
Grado
CS6250 COMPUTER NETWORK

Información del documento

Subido en
27 de enero de 2025
Número de páginas
9
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CS 6250 Test 3

(BGP hijacking) What is the type through affected prefix? - ANS-Attacks on IP prefixes
marketed through the BGP. Include specific prefix hijacking, sub-prefix hijacking, and
squatting.
(BGP hijacking) What is the classification by using AS-Path assertion? - ANS-Illegitimate AS
declares AS-route for prefix for which it would not personal. Type-zero (above), Type-N
(above to create faux route between ASes), and Type-U (adjustments prefix but no longer
course)
(BGP hijacking) What is the category by way of data plane traffic manipulation? -
ANS-Manipulate the network visitors on its manner to the receiving AS. Dropping
(black-hollow assault), Eavesdropping or manipulating (man-in-the-center attack), or
impersonating (imposture)
Compare the "input deep" and "deliver home" method of CDN server placement. -
ANS-Enter Deep: Deploy many small networks round the arena. Goal is to make distance
among person and closest server as small as feasible
Bring Home: Deploy fewer, large servers in important areas. Fewer clusters to maintain,
however users will experience better put off and slower throughput
Compare the bit charge for video, pix, and audio. - ANS-Video > Photos > Audio
Compare the 3 primary methods for dealing with packet loss in VoIP protocols. - ANS-Fast
Error Concealment: transmit redundant information so that misplaced data may be replaced
Interleaving: Mixes chunks of audio together so if a bit is misplaced, it's miles at the least not
consecutive. Prefer many small gaps to 1 big gap
Error concealment: "guessing" what the lost audio packet is. In small snippets there is
similarity among consecutive portions. (what lets in for compression)
Describe a Reflection and Amplification attack. - ANS-Attack uses set of servers (reflectors)
to ship reaction to request. Master has slaves ship spoofed requests to reflectors directed at
sufferer.
Describe the DNS message format. - ANS-ID: So purchaser can match queries with
responses
Flags: Specifications about DNS message, query, and so on
Question: Info approximately the question like the hostname
Answer: Resource report for hostname that become queried
Authority: Resource records for greater authoritative servers
Additional Info
Explain a scenario of connectivity disruption detection in case of the inbound blocking. -
ANS-When filtering occurs on the route from the website online to the reflector.
Step three by no means reaches reflector so IP ID of reflector in no way will increase.
Difference in IP ID of step 1 and 4 is 1, that means there has been filtering on course from
web page to reflector.
Explain a scenario of connectivity disruption detection in case of the outbound blockading. -
ANS-Filtering happens on outgoing course from reflector.
IP ID increments in step three, but RST by no means reaches the web page.
Site maintains to ship SYN-ACKs

, Probe by machine shows IP ID has once more extended via 2, that means retransmission of
packets has passed off
Explain a scenario of connectivity disruption detection in case when no filtering happens. -
ANS-Measurement device probes IP ID of a reflector
Measurement machine plays perturbation with the aid of sending spoofed TCP SYN to web
page
Site sends a TCP SYN-ACK packet to reflector and receives a RST in response. IP ID of
reflector is incremented by 1
MM again probes IP ID of reflector. It sees distinction of two among steps 1 and 4 which
means communication occurred among hosts
Explain buffer-filling rate and buffer-depletion fee calculation. - ANS-Buffer-filling rate:
network bandwidth divided by way of chew bitrate
Buffer-depletion fee: how a whole lot buffer is misplaced (looking a video = 1, 1 sec to
observe 1 sec of video)
Explain IXP blackholing. - ANS-If an AS member of an IXP is attacked, it ship blackholing
message to IXP route server. Router server publicizes message to all connected IXP
member ASes, which drop the visitors towards blackholed prefix. Null interface is designated
through the IXP.
Explain company-based blackholing. - ANS-Victim AS uses BGP to communicate attacked
vacation spot prefix to upstream AS, which drops the assault visitors toward this prefix.
Provider will promote it a more specific prefix and regulate the subsequent-hop deal with to
divert attack visitors to null interface.
Explain the allotted machine that uses a 2-layered system. What are the demanding
situations of this gadget? - ANS-Coarse-grained global layer: Operates at big time scales.
Has international view of client satisfactory metrics. Builds prediction model of video
high-quality
Fine-grained in line with-consumer layer: Operates at millisecond timescale. Makes
decisions upon client request
Challenges: Hard to design a centralized gadget with scale of latest networks. Needs
records for specific subnet pairs, so some customers want to be routed to sub-optimal
clusters
Explain the trouble of bandwidth over-estimation with charge-primarily based variation. -
ANS-If bandwidth adjustments swiftly, player takes time to converge to accurate estimate
Explain the hassle of bandwidth under-estimation with charge-primarily based model. -
ANS-As bitrate receives decrease, chunk size reduces, which results in bitrate going even
decrease
Explain the state of affairs of hijacking a direction. - ANS-Attacked manipulates an
advertisement and claims to have direct course to an AS (which it does not). Other ASes
adopt the faux direction to the AS.
Traffic for the AS is routed via the attacker
Explain the state of affairs of prefix hijacking. - ANS-Attacker makes use of a router to
announce a prefix belonging to another AS
Announcement reasons war among ASes. They examine statement with RIB. If the
declaration ends in a brand new great route, they consider the assertion and replace their
routes.
Traffic meant for reliable AS could be sent to attacker

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Qualityexam Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
66
Miembro desde
1 año
Número de seguidores
2
Documentos
1120
Última venta
19 horas hace

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides,Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!!

Lee mas Leer menos
4.1

15 reseñas

5
9
4
1
3
3
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes