100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
30-09-2025
Written in
2025/2026

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - Answers False Which of the following actors are part of the cyber crime underground economy? - Answers Exploit Developers, Botnet Masters, Spammers Which of the following is/are NOT a potential network level DoS mitigation? (hints: Which method is not for mitigating Dos? Which method is used for mitigating DoS attacks at the application level instead?) - Client Puzzles - CAPTCHAs - Use only TCP - Increase UDP 3-way handshake - Source Identification - Answers CAPTCHAs, Use only TCP, Increase UDP 3-way handshake T/F: In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected malicious JavaScript code in GitHub's web pages. - Answers False T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS - Answers False Select tools used for scanning in the Penetration methodology - nmap - john the ripper - siphon - fping - Answers - nmap - siphon - fping Suppose that a company owns two websites: A.com and B.com. Where a website of A.com dynamically gets resources from B.com via AJAX requests depending on the user's input, which of the following mechanisms can be adopted by the developers of B.com to allow A.com to gain access to their resources? - Cross Origin Resource Sharing - Content Security Policy - Allow Page Access Policy - Same Origin Policy - Answers Cross Origin Resource Sharing Which of the following is/are social engineering techniques: - Impersonation of Help Desk - Email Attachments - Tailgating - Pop-up windows - Answers Impersonation of Help Desk, Email Attachments, Tailgating, Pop-up windows T/F: Subresource integrity uses a cryptographic hash to ensure that webpage subresources have not changed on the way. - Answers True Which of the following is true for modern browsers that meet RFC6265, assuming the following cookie information? Cookie 1 information: name=cookie1; domain: ; path: /canvas Cookie 2 information: name=cookie2; domain: ; path: / - The browser can send cookie2 to host - As both cookies have the same path, the browser can send cookie1 to and . - can access the cookie2 since .com top-level domain (TLD) takes higher precedence than the .edu TLD. - None of the above - Answers The browser can send cookie2 to host Which of the following URLs is accessible from under the Same Origin Policy in modern browsers that meet RFC 6454, assuming the website uses the standard/default ports for HTTP and HTTPS? - - - - T/F: Cookies have integrity because a user cannot change and cannot delete cookie values. - Answers False Which of the following is NOT a recommended defense against social engineering attacks? - Allow repairmen and visitors to walk around the office or sensitive areas without an escort. - Limit information in auto-reply emails. - Never disclose passwords. - Question people you don't know. - Answers Allow repairmen and visitors to walk around the office or sensitive areas without an escort. T/F: A website """" is able to set or overwrite cookies from the website """". The server is not able to distinguish the overwritten cookies from the original cookies. This is an example of violation of session integrity. - Answers True

Show more Read less
Institution
CS 6262
Module
CS 6262

Content preview

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update 2025-2026

T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - Answers
False

Which of the following actors are part of the cyber crime underground economy? - Answers
Exploit Developers, Botnet Masters, Spammers

Which of the following is/are NOT a potential network level DoS mitigation?

(hints: Which method is not for mitigating Dos? Which method is used for mitigating DoS
attacks at the application level instead?)

- Client Puzzles

- CAPTCHAs

- Use only TCP

- Increase UDP 3-way handshake

- Source Identification - Answers CAPTCHAs, Use only TCP, Increase UDP 3-way handshake

T/F: In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected
malicious JavaScript code in GitHub's web pages. - Answers False

T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS - Answers
False

Select tools used for scanning in the Penetration methodology

- nmap

- john the ripper

- siphon

- fping - Answers - nmap

- siphon

- fping

Suppose that a company owns two websites: A.com and B.com. Where a website of A.com
dynamically gets resources from B.com via AJAX requests depending on the user's input, which
of the following mechanisms can be adopted by the developers of B.com to allow A.com to gain
access to their resources?

, - Cross Origin Resource Sharing

- Content Security Policy

- Allow Page Access Policy

- Same Origin Policy - Answers Cross Origin Resource Sharing

Which of the following is/are social engineering techniques:



- Impersonation of Help Desk

- Email Attachments

- Tailgating

- Pop-up windows - Answers Impersonation of Help Desk, Email Attachments, Tailgating, Pop-up
windows

T/F: Subresource integrity uses a cryptographic hash to ensure that webpage subresources
have not changed on the way. - Answers True

Which of the following is true for modern browsers that meet RFC6265, assuming the following
cookie information?

Cookie 1 information: name=cookie1; domain: cs6262.gatech.com; path: /canvas

Cookie 2 information: name=cookie2; domain: cs6262.gatech.edu; path: /



- The browser can send cookie2 to mail.cs6262.gatech.edu host

- As both cookies have the same path, the browser can send cookie1 to cs6262.gatech.com and
cs6262.gatech.edu.

- cs6262.gatech.com can access the cookie2 since .com top-level domain (TLD) takes higher
precedence than the .edu TLD.

- None of the above - Answers The browser can send cookie2 to mail.cs6262.gatech.edu host

Which of the following URLs is accessible from http://goodsecurity.com under the Same Origin
Policy in modern browsers that meet RFC 6454, assuming the website uses the
standard/default ports for HTTP and HTTPS?

Written for

Institution
CS 6262
Module
CS 6262

Document information

Uploaded on
September 30, 2025
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
Follow You need to be logged in order to follow users or courses
Sold
41
Member since
9 months
Number of followers
1
Documents
11636
Last sold
1 day ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions