Fall 2025/2026 Update | 100% Correct
Question 1
T/F: An attacker that uses large botnet to make requests to a server to flood is an example of amplification attack.
Correct Answer
True
Question 2
T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS.
Correct Answer
False
Page 1 of 27
,Question 3
Which of the following actors are part of the cyber crime underground economy?
Exploit Developers
Botnet Masters
Spammers
All of the above
Correct Answer
All of the above
Question 4
Which of the following is/are NOT a potential network DoS mitigation? Select multiple.
Client Puzzles
CAPTCHAs
Source Identification
Use only TCP
Increase UDP 3-way handshake
Correct Answer
CAPTCHAs
Use only TCP
Increase UDP 3-way handshake
Page 2 of 27
, Question 5
In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected malicious JavaScript code in
GitHub's web pages.
Correct Answer
False
Question 6
T/F: A website ""http://gatech.edu"" is able to set or overwrite cookies from the website ""https://gatech.edu"". The server
is not able to distinguish the overwritten cookies from the original cookies. This is an example of violation of session
integrity.
Correct Answer
True
Question 7
Which is INCORRECT regarding the session token?
Tokens will expire, but there should still be mechanisms to revoke them if necessary
Token size, like cookie size, is not a concern
The token must be stored somewhere
All of them
Correct Answer
Token size, like cookie size, is not a concern
Page 3 of 27