100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CS6262- Network Security Exam Questions and Answers

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
31-01-2025
Written in
2024/2025

CS6262- Network Security Exam Questions and Answers

Institution
CS6262
Course
CS6262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CS6262
Course
CS6262

Document information

Uploaded on
January 31, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CS6262- Network Security Exam
Questions and Answers

DOS attack classification- Hitlist Scanning ANSWERS A portion of a list of targets
is supplied to
a compromised computer

DOS attack classification - Permutation Scanning ANSWERS All compromised
computers share a
common pseudo-random permutation of the
IP address space.

DOS attack classification - Signpost Scanning ANSWERS Uses the
communication patterns of the
compromised computer to find new target.

DOS attack classification- Random Scanning ANSWERS Each compromised
computer probes
random addresses

DOS attack classification - Random Spoofing ANSWERS Generate 32-bit
numbers and stamp
packets with them.


SYN flood attack ANSWERS An attack that takes advantage of the procedures for
initiating a TCP/IP session. Type of DoS attack in which the attacker sends multiple
SYN messages initializing TCP connections with a target host. The attacker uses IP
spoofing to send a large number of packets requesting connections to the victim
computer. These appear to be legitimate but in fact reference a client system that is
unable to respond. Example: MS blaster worm

MS Blaster Worm ANSWERS The Blaster worm in 2003 infected many machines.
And these infected machines were insructed to launch a denial of service attack at noon
on August 16th. That is, these machines were instructed to launch SYN flood on port 80
on the target server windowsupdate.com. In particular, 50 SYN requests were sent
every second. And each packet is 40 bytes. And the source IP address of these request
packets were randomly generated. As a result, the server windowsupdate.com was
rendered unavailable. As a response, Microsoft moved the Windows update service to a
new domain, windowsupdate.microsoft.com.

, how do we defend against SYN flood attacks? ANSWERS How about increase
the memory size or decrease the timeout value so that when a server does not receive
an ACK packet, it just clears out the memory. These are not good solutions, because an
attacker can just send more packets or at a faster pace. A better solution is to remove
the need for a server to keep state.

ANSWERS SYN cookies does not require modified version of TCP, so this is
false. SYN cookies are only applied when there's a SYN flood attack. That is, during
normal operations, or when a server does not experience a overload, it does not require
SYN cookies. Therefore, SYN cookies should not lead to overall slower performance,
that is the second statement is false. The third statement is true because during an
attack, the server uses SYN cookies and does not keep stay information in memory.

IP Traceback ANSWERS identify the network path(s) traversed by attack traffic
without requiring interactive operational support from Internet Service
Providers (ISPs). Moreover, this traceback can be performed
"post-mortem" - after an attack has completed.

DOS attack classification - Subnet Spoofing ANSWERS Generate random
addresses within
a given address space.

DOS attack classification - Fixed Spoofing ANSWERS The spoofed address is the
address
of the target.

DOS attack classification - Infrastructure attack ANSWERS The motivation of this
attack is a
crucial service of a global internet
operation, for example core router

DOS attack classification - Server Application ANSWERS The attack is targeted to
a specific
application on a server

DOS attack classification -Network Access ANSWERS The attack is used to
overload or
crash the communication mechanism of a
network.

Amplification DOS attack ANSWERS Amplification DOS Attack means that the
attacker only needs to send a small number of packets and can achieve a big effect
such as rendering the targeted site unavailable.

Types of amplification attacks. ANSWERS DoS bug and DOS flood. Denial of
service bug and denial of service flood

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2812
Member since
3 year
Number of followers
1959
Documents
40858
Last sold
1 day ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

534 reviews

5
234
4
83
3
103
2
31
1
83

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions