100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CS6262- Network Security exam with correct answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
27-08-2025
Written in
2025/2026

CS6262- Network Security exam with correct answers

Institution
Cs6262
Course
Cs6262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cs6262
Course
Cs6262

Document information

Uploaded on
August 27, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CS6262- Network Security exam with |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




correct answers |||\\\




DOS attack classification- Hitlist Scanning - correct answersA portion of a list of targets is supplied to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




a compromised computer
|||\\\ |||\\\




DOS attack classification - Permutation Scanning - correct answersAll compromised computers share a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




common pseudo-random permutation of the |||\\\ |||\\\ |||\\\ |||\\\




IP address space.
|||\\\ |||\\\




DOS attack classification - Signpost Scanning - correct answersUses the communication patterns of the
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




compromised computer to find new target. |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




DOS attack classification- Random Scanning - correct answersEach compromised computer probes
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




random addresses |||\\\




DOS attack classification - Random Spoofing - correct answersGenerate 32-bit numbers and stamp
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




packets with them. |||\\\ |||\\\




DOS attack classification - Subnet Spoofing - correct answersGenerate random addresses within
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




a given address space.
|||\\\ |||\\\ |||\\\




DOS attack classification - Fixed Spoofing - correct answersThe spoofed address is the address
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




of the target.
|||\\\ |||\\\




DOS attack classification - Infrastructure attack - correct answersThe motivation of this attack is a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




crucial service of a global internet
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\

, operation, for example core router |||\\\ |||\\\ |||\\\ |||\\\




DOS attack classification - Server Application - correct answersThe attack is targeted to a specific
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




application on a server |||\\\ |||\\\ |||\\\




DOS attack classification -Network Access - correct answersThe attack is used to overload or
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




crash the communication mechanism of a |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




network.



Amplification DOS attack - correct answersAmplification DOS Attack means that the attacker only |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




needs to send a small number of packets and can achieve a big effect such as rendering the targeted
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




site unavailable. |||\\\




Types of amplification attacks. - correct answersDoS bug and DOS flood. Denial of service bug and
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




denial of service flood |||\\\ |||\\\ |||\\\




DoS bug - correct answersDoS attack designed to exploit a bug say a design flaw or vulnerability, an
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




implementation error on the server. The attacker machine can send a few packets that contain input |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




that would trigger the bug and then crash the server rendering it unavailable
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




NTP (Network Time Protocol) - correct answersAn UDP based Internet protocol that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




synchronization of computer clock times in a network of computers by exchanging time signals. (UDP |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




123)



Why is NTP vulnerable to amplification attacks? - correct answers
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




Internet Protocol (IP) - correct answersThe network protocol that deals with the routing of packets
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




through interconnected networks to the final destination. A communication standard that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




computers to route communications traffic from one network to another as needed. It is |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




connectionless, unreliable and best effort based. Each packet will find it's way to destination and there |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\




is no mechanism to ensure that all packets will arrive properly and in sequence
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
$12.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
progrades
3.0
(1)

Get to know the seller

Seller avatar
progrades Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
3 months
Number of followers
0
Documents
2578
Last sold
1 week ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions