100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

cs6262 quizzes exam with correct answers.

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
27-08-2025
Written in
2025/2026

cs6262 quizzes exam with correct answers.

Institution
Cs6262
Course
Cs6262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cs6262
Course
Cs6262

Document information

Uploaded on
August 27, 2025
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

cs6262 quizzes exam with correct answers |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




T/F: An amplification attack occurs when an attacker sends a small number of packets to elicit a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




much larger response from a server or service, overwhelming the intended target. - correct
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




answerstrue



T/F: TCP has the necessary safeguards in place to prevent network DoS - correct answersfalse
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Which of the following actors are part of the cyber crime underground economy?
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




- exploit developers
|||\\\ |||\\\




- botnet masters
|||\\\ |||\\\




- spammers
|||\\\




- all of the above - correct answersall of the above
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Which of the following is/are NOT a potential network level DoS mitigation?
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




(hints: Which method is not for mitigating Dos? Which method is used for mitigating DoS attacks at
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




the application level instead? Notice the difference between application level and network level!)
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




- client puzzles
|||\\\ |||\\\




- CAPTCHAs
|||\\\




- source id
|||\\\ |||\\\




- use only TCP
|||\\\ |||\\\ |||\\\




- increase UDP 3-way handshake - correct answersCAPTCHAs, use only TCP, increase UDP 3-way
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




handshake



In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




malicious JavaScript code in GitHub's web pages. - correct answerstrue |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Select tools used for scanning in the Penetration methodology.
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




- nmap
|||\\\

, -john the ripper |||\\\ |||\\\




-siphon

-fping - correct answersnmap, siphon, fping
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Suppose that a company owns two websites: A.com and B.com. Where a website of A.com
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




dynamically gets resources from B.com via AJAX requests depending on the user's input, which of
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




the following mechanisms can be adopted by the developers of B.com to allow A.com to gain
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




access to their resources? - correct answerscross origin resource sharing
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Which of the following is/are social engineering techniques:
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




- impersonation
|||\\\




- email attachments
|||\\\ |||\\\




- tailgating
|||\\\




- pop-up windows - correct answersall
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




[T/F] Subresource integrity uses a cryptographic hash to ensure that webpage subresources have
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




not changed on the way. - correct answerstrue
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Which of the following is true for modern browsers that meet RFC6265Links to an external site.,
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




assuming the following cookie information? |||\\\ |||\\\ |||\\\ |||\\\




Cookie 1 information: name=cookie1; domain: cs6262.gatech.com; path: /canvas
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Cookie 2 information: name=cookie2; domain: cs6262.gatech.edu; path: / - correct answersthe
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




browser can send cookie2 to mail.cs6262.gatech.edu host |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Which of the following URLs is accessible from http://goodsecurity.com under the Same Origin
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Policy in modern browsers that meet RFC 6454Links to an external site., assuming the website uses
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




the standard/default ports for HTTP and HTTPS? - correct
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




answershttp://goodsecurity.com:80/admin



Cookies have integrity because a user cannot change and cannot delete cookie values. - correct
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




answersfalse
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
progrades
3.0
(1)

Get to know the seller

Seller avatar
progrades Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
3 months
Number of followers
0
Documents
2578
Last sold
1 week ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions