100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CS6262 Final Exam with correct answers.

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
27-08-2025
Escrito en
2025/2026

CS6262 Final Exam with correct answers.

Institución
Cs6262
Grado
Cs6262









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cs6262
Grado
Cs6262

Información del documento

Subido en
27 de agosto de 2025
Número de páginas
14
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CS6262 Final Exam with correct answers |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Random Scanning - correct answersEach comprised computer probes random addresses
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Permutation Scanning - correct answersAll comprised computers share a common psuedo-random |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




permutation of the IP address space |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Signpost Scanning - correct answersUses the communication patterns of the comprised computer to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




find a new target
|||\\\ |||\\\ |||\\\ |||\\\




Hit List Scanning - correct answersA portion of a list of targets is supplied to a comprised computer
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Subnet Spoofing - correct answersGenerate random addresses within a given address space
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Random Sppofing - correct answersGenerate 32-bit numbers and stamp packets with them
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Fixed Spoofing - correct answersThe spoofed address is the address of the target
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Server Application - correct answersThe attack is targeted to a specific application on a server
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Network Access - correct answersThe attack is used to overload or crash the communication
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




mechanism of a network |||\\\ |||\\\ |||\\\




Infrastructure - correct answersThe motivation of this attack is a crucial service of a global internet
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




operation, for example core router |||\\\ |||\\\ |||\\\ |||\\\




DoS Bug (Amplification Attack) - correct answersDesign flaw allowing one machine to disrupt a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




service

, DoS Flood (Amplification Attack) - correct answersCommand botnets to generate flood of requests
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




UDP-based NTP - correct answers-Particularly vulnerable to amplification attacks |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




-Small command can generate a large response |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




-Vulnerable to source IP spoofing |||\\\ |||\\\ |||\\\ |||\\\




-Difficult to ensure computers only communicate with legitimate NTP servers |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




IP Header Format - correct answers-Connectionless
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




-Unreliable

-No authentication |||\\\




SYN Flood - correct answersA type of DoS where an attacker sends a large amount of SYN request
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




packets to a server in an attempt to deny service. |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




SYN Flood Mitigations - correct answersSyn Cookies - remove state from server, but incur
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




performance overhead |||\\\




Crowdturfers - correct answers- Crowdsource to create, verify, and manage fake accounts |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




- Solve CAPTCHAs
|||\\\ |||\\\




Penetration Testing - correct answersFootprinting, Scanning, Enumeration, Gaining Access, |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Escalating Privileged, Pilfering (steal data), Covering Tracks, Creating Backdoors |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




NS Record - correct answersPoints to other server
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




A Record - correct answersContains IP Address
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




MX - correct answersAddress in charge of handling email
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




TXT - correct answersGeneric text; distribute site public keys
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
progrades
3.0
(1)

Conoce al vendedor

Seller avatar
progrades Walden University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
5
Miembro desde
3 meses
Número de seguidores
0
Documentos
2578
Última venta
1 semana hace

3.0

1 reseñas

5
0
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes