CS6262 Final Exam Questions and Answers | Fall 2025/2026
Update | 100% Correct
Question 1
Random Scanning
Correct Answer
Each comprised computer probes random addresses
Question 2
Permutation Scanning
Correct Answer
All comprised computers share a common psuedo-random permutation of the IP address space
Question 3
Signpost Scanning
Correct Answer
Uses the communication patterns of the comprised computer to find a new target
Page 1 of 32
,Question 4
Hit List Scanning
Correct Answer
A portion of a list of targets is supplied to a comprised computer
Question 5
Subnet Spoofing
Correct Answer
Generate random addresses within a given address space
Question 6
Random Sppofing
Correct Answer
Generate 32-bit numbers and stamp packets with them
Question 7
Fixed Spoofing
Correct Answer
The spoofed address is the address of the target
Page 2 of 32
,Question 8
Server Application
Correct Answer
The attack is targeted to a specific application on a server
Question 9
Network Access
Correct Answer
The attack is used to overload or crash the communication mechanism of a network
Question 10
Infrastructure
Correct Answer
The motivation of this attack is a crucial service of a global internet operation, for example core router
Question 11
DoS Bug (Amplification Attack)
Correct Answer
Design flaw allowing one machine to disrupt a service
Page 3 of 32
, Question 12
DoS Flood (Amplification Attack)
Correct Answer
Command botnets to generate flood of requests
Question 13
UDP-based NTP
Correct Answer
-Particularly vulnerable to amplification attacks
-Small command can generate a large response
-Vulnerable to source IP spoofing
-Difficult to ensure computers only communicate with legitimate NTP servers
Question 14
IP Header Format
Correct Answer
-Connectionless
-Unreliable
-No authentication
Page 4 of 32
Update | 100% Correct
Question 1
Random Scanning
Correct Answer
Each comprised computer probes random addresses
Question 2
Permutation Scanning
Correct Answer
All comprised computers share a common psuedo-random permutation of the IP address space
Question 3
Signpost Scanning
Correct Answer
Uses the communication patterns of the comprised computer to find a new target
Page 1 of 32
,Question 4
Hit List Scanning
Correct Answer
A portion of a list of targets is supplied to a comprised computer
Question 5
Subnet Spoofing
Correct Answer
Generate random addresses within a given address space
Question 6
Random Sppofing
Correct Answer
Generate 32-bit numbers and stamp packets with them
Question 7
Fixed Spoofing
Correct Answer
The spoofed address is the address of the target
Page 2 of 32
,Question 8
Server Application
Correct Answer
The attack is targeted to a specific application on a server
Question 9
Network Access
Correct Answer
The attack is used to overload or crash the communication mechanism of a network
Question 10
Infrastructure
Correct Answer
The motivation of this attack is a crucial service of a global internet operation, for example core router
Question 11
DoS Bug (Amplification Attack)
Correct Answer
Design flaw allowing one machine to disrupt a service
Page 3 of 32
, Question 12
DoS Flood (Amplification Attack)
Correct Answer
Command botnets to generate flood of requests
Question 13
UDP-based NTP
Correct Answer
-Particularly vulnerable to amplification attacks
-Small command can generate a large response
-Vulnerable to source IP spoofing
-Difficult to ensure computers only communicate with legitimate NTP servers
Question 14
IP Header Format
Correct Answer
-Connectionless
-Unreliable
-No authentication
Page 4 of 32