100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CS 6262 Quiz 1 Questions with Correct Answers Latest Version

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
30-09-2025
Written in
2025/2026

CS 6262 Quiz 1 Questions with Correct Answers Latest Version Random Scanning - Answers Each compromised computer probes random addresses. Permutation Scanning - Answers All compromised computers shared a common pseudo-random permutation of the IP address space. Signpost Scanning - Answers Uses the communication patterns of the compromised computer to find new target. Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer. Subnet spoofing - Answers Generate random addresses with a given address space Random spoofing - Answers Generate 32-bit numbers and stamp packets with them. Fixed spoofing - Answers The spoofed address is the address of the target. Server Application - Answers The attack is targeted to a specific application on a server. Network Access Attack - Answers The attack is used to overload or crash the communication mechanism of a network. Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global internet operation, for example a core router. Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers • a small command can generate a large response. • Vulnerable to source IP spoofing. • It is difficult to ensure computers communicate only with legitimate NTP servers. SYN Cookie - Answers The server must reject all TCP options because the server discards the SYN queue entry. UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets. • Firewalls cannot stop a flood because the firewall is susceptible to flooding. CAPTCHA Puzzles - Answers • Client puzzles should be stateless. • Puzzle complexity should increase as the strength of the attack increases. What assumptions can be made about trace backs? - Answers Attackers may work alone or in groups Edge Sampling What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can be identified since edge identifies splits in reverse path. • Requires space in the IP packet header. Reflector Attacks Self defense against reflector attacks should incorporate the following: - Answers • Server redundancy - servers should be located in multiple networks and locations. • Traffic limiting - traffic from a name server should be limited to reasonable thresholds. Deep Web - Answers It is not indexed by standard search engines Dark Web - Answers Web content that exists on darknets Surface Web - Answers Readily available to the public, and searchable with standard search engines. Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page. Crypters - Answers A program that hides malicious code from anti-virus software. Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by manipulating search engines. Trojan Download Manager - Answers Software that allows an attacker to update or install malware on a victim's computer. Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant 2) Large number of recipients Name the top three countries where spam directed visitors added items to their shopping carts: - Answers 1) United States 2) Canada 3) Philippines Which events should trigger a penetration test? • Infastructure is added or modified • Applications are added of modified • End user policies are changed • Security patches are installed - Answers • Infastructure is added or modified

Show more Read less
Institution
CS 6262
Course
CS 6262

Content preview

CS 6262 Quiz 1 Questions with Correct Answers Latest Version 2025-2026

Random Scanning - Answers Each compromised computer probes random addresses.

Permutation Scanning - Answers All compromised computers shared a common pseudo-
random permutation of the IP address space.

Signpost Scanning - Answers Uses the communication patterns of the compromised computer
to find new target.

Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer.

Subnet spoofing - Answers Generate random addresses with a given address space

Random spoofing - Answers Generate 32-bit numbers and stamp packets with them.

Fixed spoofing - Answers The spoofed address is the address of the target.

Server Application - Answers The attack is targeted to a specific application on a server.

Network Access Attack - Answers The attack is used to overload or crash the communication
mechanism of a network.

Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global
internet operation, for example a core router.

Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers •
a small command can generate a large response.

• Vulnerable to source IP spoofing.

• It is difficult to ensure computers communicate only with legitimate NTP servers.

SYN Cookie - Answers The server must reject all TCP options because the server discards the
SYN queue entry.

UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets.

• Firewalls cannot stop a flood because the firewall is susceptible to flooding.

CAPTCHA Puzzles - Answers • Client puzzles should be stateless.

• Puzzle complexity should increase as the strength of the attack increases.

What assumptions can be made about trace backs? - Answers Attackers may work alone or in
groups

Edge Sampling

, What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can
be identified since edge identifies splits in reverse path.

• Requires space in the IP packet header.

Reflector Attacks

Self defense against reflector attacks should incorporate the following: - Answers • Server
redundancy - servers should be located in multiple networks and locations.

• Traffic limiting - traffic from a name server should be limited to reasonable thresholds.

Deep Web - Answers It is not indexed by standard search engines

Dark Web - Answers Web content that exists on darknets

Surface Web - Answers Readily available to the public, and searchable with standard search
engines.

Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search
engine ranking. Scripts on the page redirect to the attackers page.

Crypters - Answers A program that hides malicious code from anti-virus software.

Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by
manipulating search engines.

Trojan Download Manager - Answers Software that allows an attacker to update or install
malware on a victim's computer.

Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant

2) Large number of recipients

Name the top three countries where spam directed visitors added items to their shopping carts:
- Answers 1) United States

2) Canada

3) Philippines

Which events should trigger a penetration test?

• Infastructure is added or modified

• Applications are added of modified

• End user policies are changed

Written for

Institution
CS 6262
Course
CS 6262

Document information

Uploaded on
September 30, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
41
Member since
9 months
Number of followers
1
Documents
11636
Last sold
1 day ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions