100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CS 6262 Exam Questions with Correct Answers Latest Update

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
30-09-2025
Written in
2025/2026

CS 6262 Exam Questions with Correct Answers Latest Update A bug is different from a vulnerability in that a bug can be exploited and a vulnerability cannot - Answers False Which of the following are memory corruption vulnerabilities? - Answers Stack Overflow Use after Free What is the difference between a vulnerability and a control flow hijack - Answers The hijack is a way you can exploit a vulnerability A __________ attack is a type of ____________. The ROP is used because the code many not contain many useful gadgets - Answers 1. ROP 2. Return to Libc What method do you use to protect from a return to libc attack - Answers ASLR Stack canaries must be a random value every time so that they are not easily guessed or found - Answers True What cant CFI protect against - Answers Format string attack Select two methods for software fault isolation - Answers Sandboxing Segment matching A memory violation involves only a pointer that points out of bounds - Answers False Select the analysis method that can be sound in some cases - Answers Static Analysis A sound but incomplete analysis will create the following conditions - Answers Reports all errors Reports some false positives Comparing patterns in the code against a databsae is called ____________. This can detect errors such as __________ or _____________ - Answers Syntactic Analysis Typos Poor use of APIs If some variable y does not rely on some variable x and variable x is defined by user input, then y is not tainted - Answers False The difference between regression testing and fuzzing is - Answers Regression tests use normal inputs while fuzzing tests with abnormal inputs The advantages of mutation-based fuzzing include being really easy to set up and complete - Answers True What are the steps for fuzzing - Answers 1. Input generation 2. Input injection 3. Bug detection The perturbing technique that relies on injecting boundary values such as -1 or o is called - Answers Interest Number the setps in the malware analysis pipeline starting from when you receive the malware - Answers 1. Malware received 2. Core analysis engine 3. Information extractor engine 4. Execution in lab environment 5. Automatic Defense Modeling What are some techniques malware authors use to prevent their malware from being analyzed - Answers Debug flag detection VM detection Code packing What API do we assign the most weight to when looking for basic blocks that are dispatchers during static analysis - Answers Network related We use hybrid analysis because we want to - Answers Find the correct command to trigger the malware How can you prevent malware from communicating with the C&C server during execution - Answers Set up a virtual DNS The mixed analysis engine find all the paths in the program by creating formulae based on path conditions - Answers False Please order the following steps in the cyber kill chain model - Answers Recon Weaponization Delivery Exploitation Installation Command and Control Actions and Objectives What are some ways a system admin can thwart an attacker who wishes to C&C a computer? - Answers Set up the computer behind a FW Use and IDS Open source data feeds can be unreliable because they are not updated frequently - Answers

Show more Read less
Institution
CS 6262
Course
CS 6262

Content preview

CS 6262 Exam Questions with Correct Answers Latest Update 2025-2026

A bug is different from a vulnerability in that a bug can be exploited and a vulnerability cannot -
Answers False

Which of the following are memory corruption vulnerabilities? - Answers Stack Overflow

Use after Free

What is the difference between a vulnerability and a control flow hijack - Answers The hijack is a
way you can exploit a vulnerability

A __________ attack is a type of ____________. The ROP is used because the code many not
contain many useful gadgets - Answers 1. ROP

2. Return to Libc

What method do you use to protect from a return to libc attack - Answers ASLR

Stack canaries must be a random value every time so that they are not easily guessed or found -
Answers True

What cant CFI protect against - Answers Format string attack

Select two methods for software fault isolation - Answers Sandboxing

Segment matching

A memory violation involves only a pointer that points out of bounds - Answers False

Select the analysis method that can be sound in some cases - Answers Static Analysis

A sound but incomplete analysis will create the following conditions - Answers Reports all
errors

Reports some false positives

Comparing patterns in the code against a databsae is called ____________. This can detect errors
such as __________ or _____________ - Answers Syntactic Analysis

Typos

Poor use of APIs

If some variable y does not rely on some variable x and variable x is defined by user input, then y
is not tainted - Answers False

The difference between regression testing and fuzzing is - Answers Regression tests use
normal inputs while fuzzing tests with abnormal inputs

, The advantages of mutation-based fuzzing include being really easy to set up and complete -
Answers True

What are the steps for fuzzing - Answers 1. Input generation

2. Input injection

3. Bug detection

The perturbing technique that relies on injecting boundary values such as -1 or o is called -
Answers Interest

Number the setps in the malware analysis pipeline starting from when you receive the malware -
Answers 1. Malware received

2. Core analysis engine

3. Information extractor engine

4. Execution in lab environment

5. Automatic Defense Modeling

What are some techniques malware authors use to prevent their malware from being analyzed -
Answers Debug flag detection

VM detection

Code packing

What API do we assign the most weight to when looking for basic blocks that are dispatchers
during static analysis - Answers Network related

We use hybrid analysis because we want to - Answers Find the correct command to trigger the
malware

How can you prevent malware from communicating with the C&C server during execution -
Answers Set up a virtual DNS

The mixed analysis engine find all the paths in the program by creating formulae based on path
conditions - Answers False

Please order the following steps in the cyber kill chain model - Answers Recon

Weaponization

Delivery

Exploitation

Written for

Institution
CS 6262
Course
CS 6262

Document information

Uploaded on
September 30, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
41
Member since
9 months
Number of followers
1
Documents
11636
Last sold
1 day ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions