CS 6250 Quiz 9 Latest 2024 Update with complete solution-Georgia Institute Of Technology
CS 6250 Quiz 9 Latest 2024 Update with complete solution Lesson 9 Quiz: Internet Security Results Score for this quiz: 14 out of 16 Question 1 1 / pts Determine which property of secure communication is primarily violated in the event that a third party pretends to be another entity on the network Confidentiality Integrity Authentication Availability Question 2 1 / pts Determine which property of secure communication is primarily violated in the event that Trudy is able to access (but not modify) the contents of a message between Alice and Bob. Confidentiality Integrity Authentication Availability Question 3 1 / 1 pts Round Robin DNS (RRDNS) is one of the “tools” that malicious parties can use to extend the time their content is accessible/hosted on the Internet. True or false? True False Question 4 1 / 1 pts Fast-Flux Service Networks (FFSNs) can be leveraged by malicious actors to extend the availability of a scam True or false? True False Question 5 1 / 1 pts Which statement best describes the primary qualitative difference between rogue and legitimate networks based on the evidence of abuse and the findings of the FIRE system? Rogue networks actively seek out and support malicious activities, while legitimate networks unintentionally host malicious content due to security lapses. Rogue networks primarily exist for hosting and distributing pirated software, while legitimate networks focus on genuine content distribution. The longevity of malicious behavior on rogue networks is significantly longer, often lasting weeks to over a year, whereas legitimate networks usually remove malicious content within a few days. The primary distinction is based on the geographical location of the network servers, with rogue networks predominantly located in regions with lax cyber regulations. Question 6 1 / 1 pts The FIRE system takes primarily a reactive approach to infer network reputation, relying on monitoring IP blacklists. True False Question 7 1 / 1 pts ASwatch takes primarily a proactive approach to infer network reputation by monitoring the routing behavior of networks. True False Question 8 1 / 1 pts How can a rogue network remain undetected by ASwatch (stay under the radar)? By switching frequently to a different upstream provider. By lowering the ratio of malicious IP addresses to the total owned IP addresses. By maintaining a stable control plane behavior. IncorrectQuestion 9 0 / 1 pts Determine which system monitors routing behavior to determine the legitimacy of a network. FIRE ASwatch ARTEMIS Stellar Question 10 1 / 1 pts Determine which system uses routing behavior to detect BGP hijacking attacks. FIRE ASwatch ARTEMIS Stellar Question 11 1 / 1 pts BGP Blackholing is a defense against prefix hijacking. True False Question 12 1 / 1 pts The BGP blackholing technique can only be applied for traffic related to specific applications. True False Question 13 1 / 1 pts In a reflection and amplification DDoS attack (demonstrated in the image below), whose IP address is spoofed to direct amplified traffic to the intended victim? IP Address of the Victim IP address of the Reflector IP address of the Master IP address of the Slaves Question 14 1 / 1 pts When designing a system to identify DNS reflection and amplification attacks, which network operation plane(s) is essential to monitor for effective detection? Control Plane Data Plane Management Plane Control Plane and Data Plane IncorrectQuestion 15 0 / 1 pts To effectively identify BGP hijacking incidents, specifically targeting BGP path and prefix manipulations, which network operation plane(s) should you primarily monitor? Control Plane Data Plane Management Plane Control Plane and Data Plane Question 16 1 / 1 pts Which of the following techniques can help an attacker to attract more traffic when attempting to hijack a prefix? Select all that apply. Advertise a more specific prefix than the original owner AS Advertise a shorter path to the prefix. Advertise the same path as the original owner AS but change the origin AS. Quiz Score: 14 out of 16
Written for
- Institution
- CS 6250
- Course
- CS 6250
Document information
- Uploaded on
- June 3, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cs 6250 quiz 9 latest 2024 update with complete so
-
determine which property of secure communication i
-
determine which property of secure communication i
-
round robin dns rrdns is one of the tools that
Also available in package deal