CS6262 FINAL EXAM ACCURATE AND FREQUENTLY
TESTED QUESTIONS AND 100% CORRECT
ANSWERS|| LATEST AND COMPLETE UPDATE WITH
EXPERT VERIFIED SOLUTIONS|| SURE PASS
Random Scanning - ANSWER: Each comprised computer probes random
addresses
Permutation Scanning - ANSWER: All comprised computers share a common
psuedo-random permutation of the IP address space
Signpost Scanning - ANSWER: Uses the communication patterns of the
comprised computer to find a new target
Hit List Scanning - ANSWER: A portion of a list of targets is supplied to a
comprised computer
Subnet Spoofing - ANSWER: Generate random addresses within a given address
space
Random Sppofing - ANSWER: Generate 32-bit numbers and stamp packets with
them
Fixed Spoofing - ANSWER: The spoofed address is the address of the target
Server Application - ANSWER: The attack is targeted to a specific application on
a server
,2|Page
Network Access - ANSWER: The attack is used to overload or crash the
communication mechanism of a network
Infrastructure - ANSWER: The motivation of this attack is a crucial service of a
global internet operation, for example core router
DoS Bug (Amplification Attack) - ANSWER: Design flaw allowing one machine
to disrupt a service
DoS Flood (Amplification Attack) - ANSWER: Command botnets to generate
flood of requests
UDP-based NTP - ANSWER: -Particularly vulnerable to amplification attacks
-Small command can generate a large response
-Vulnerable to source IP spoofing
-Difficult to ensure computers only communicate with legitimate NTP servers
IP Header Format - ANSWER: -Connectionless
-Unreliable
-No authentication
SYN Flood - ANSWER: A type of DoS where an attacker sends a large amount
of SYN request packets to a server in an attempt to deny service.
SYN Flood Mitigations - ANSWER: Syn Cookies - remove state from server, but
incur performance overhead
, 3|Page
Crowdturfers - ANSWER: - Crowdsource to create, verify, and manage fake
accounts
- Solve CAPTCHAs
Penetration Testing - ANSWER: Footprinting, Scanning, Enumeration, Gaining
Access, Escalating Privileged, Pilfering (steal data), Covering Tracks, Creating
Backdoors
NS Record - ANSWER: Points to other server
A Record - ANSWER: Contains IP Address
MX - ANSWER: Address in charge of handling email
TXT - ANSWER: Generic text; distribute site public keys
DNS vulnerabilities - ANSWER: - Users/hosts trust the host-address mapping
provided by DNS
- Interception of requests or compromise of DNS servers
- Few use DNSsec
- Cache poisining
Cache Poisoning - ANSWER: Corrupting an Internet server's DNS table by
replacing an Internet address with that of another, rogue address. When a Web user
seeks the page with that address, the request is redirected by the rogue entry in the
table to a different address. At that point, a worm, spyware, Web browser hijacking
program, or other malware can be downloaded to the user's computer from the
rogue location.