100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CS 6262 Exam Questions with Correct Answers Latest Update

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
30-09-2025
Escrito en
2025/2026

CS 6262 Exam Questions with Correct Answers Latest Update A bug is different from a vulnerability in that a bug can be exploited and a vulnerability cannot - Answers False Which of the following are memory corruption vulnerabilities? - Answers Stack Overflow Use after Free What is the difference between a vulnerability and a control flow hijack - Answers The hijack is a way you can exploit a vulnerability A __________ attack is a type of ____________. The ROP is used because the code many not contain many useful gadgets - Answers 1. ROP 2. Return to Libc What method do you use to protect from a return to libc attack - Answers ASLR Stack canaries must be a random value every time so that they are not easily guessed or found - Answers True What cant CFI protect against - Answers Format string attack Select two methods for software fault isolation - Answers Sandboxing Segment matching A memory violation involves only a pointer that points out of bounds - Answers False Select the analysis method that can be sound in some cases - Answers Static Analysis A sound but incomplete analysis will create the following conditions - Answers Reports all errors Reports some false positives Comparing patterns in the code against a databsae is called ____________. This can detect errors such as __________ or _____________ - Answers Syntactic Analysis Typos Poor use of APIs If some variable y does not rely on some variable x and variable x is defined by user input, then y is not tainted - Answers False The difference between regression testing and fuzzing is - Answers Regression tests use normal inputs while fuzzing tests with abnormal inputs The advantages of mutation-based fuzzing include being really easy to set up and complete - Answers True What are the steps for fuzzing - Answers 1. Input generation 2. Input injection 3. Bug detection The perturbing technique that relies on injecting boundary values such as -1 or o is called - Answers Interest Number the setps in the malware analysis pipeline starting from when you receive the malware - Answers 1. Malware received 2. Core analysis engine 3. Information extractor engine 4. Execution in lab environment 5. Automatic Defense Modeling What are some techniques malware authors use to prevent their malware from being analyzed - Answers Debug flag detection VM detection Code packing What API do we assign the most weight to when looking for basic blocks that are dispatchers during static analysis - Answers Network related We use hybrid analysis because we want to - Answers Find the correct command to trigger the malware How can you prevent malware from communicating with the C&C server during execution - Answers Set up a virtual DNS The mixed analysis engine find all the paths in the program by creating formulae based on path conditions - Answers False Please order the following steps in the cyber kill chain model - Answers Recon Weaponization Delivery Exploitation Installation Command and Control Actions and Objectives What are some ways a system admin can thwart an attacker who wishes to C&C a computer? - Answers Set up the computer behind a FW Use and IDS Open source data feeds can be unreliable because they are not updated frequently - Answers

Mostrar más Leer menos
Institución
CS 6262
Grado
CS 6262

Vista previa del contenido

CS 6262 Exam Questions with Correct Answers Latest Update 2025-2026

A bug is different from a vulnerability in that a bug can be exploited and a vulnerability cannot -
Answers False

Which of the following are memory corruption vulnerabilities? - Answers Stack Overflow

Use after Free

What is the difference between a vulnerability and a control flow hijack - Answers The hijack is a
way you can exploit a vulnerability

A __________ attack is a type of ____________. The ROP is used because the code many not
contain many useful gadgets - Answers 1. ROP

2. Return to Libc

What method do you use to protect from a return to libc attack - Answers ASLR

Stack canaries must be a random value every time so that they are not easily guessed or found -
Answers True

What cant CFI protect against - Answers Format string attack

Select two methods for software fault isolation - Answers Sandboxing

Segment matching

A memory violation involves only a pointer that points out of bounds - Answers False

Select the analysis method that can be sound in some cases - Answers Static Analysis

A sound but incomplete analysis will create the following conditions - Answers Reports all
errors

Reports some false positives

Comparing patterns in the code against a databsae is called ____________. This can detect errors
such as __________ or _____________ - Answers Syntactic Analysis

Typos

Poor use of APIs

If some variable y does not rely on some variable x and variable x is defined by user input, then y
is not tainted - Answers False

The difference between regression testing and fuzzing is - Answers Regression tests use
normal inputs while fuzzing tests with abnormal inputs

, The advantages of mutation-based fuzzing include being really easy to set up and complete -
Answers True

What are the steps for fuzzing - Answers 1. Input generation

2. Input injection

3. Bug detection

The perturbing technique that relies on injecting boundary values such as -1 or o is called -
Answers Interest

Number the setps in the malware analysis pipeline starting from when you receive the malware -
Answers 1. Malware received

2. Core analysis engine

3. Information extractor engine

4. Execution in lab environment

5. Automatic Defense Modeling

What are some techniques malware authors use to prevent their malware from being analyzed -
Answers Debug flag detection

VM detection

Code packing

What API do we assign the most weight to when looking for basic blocks that are dispatchers
during static analysis - Answers Network related

We use hybrid analysis because we want to - Answers Find the correct command to trigger the
malware

How can you prevent malware from communicating with the C&C server during execution -
Answers Set up a virtual DNS

The mixed analysis engine find all the paths in the program by creating formulae based on path
conditions - Answers False

Please order the following steps in the cyber kill chain model - Answers Recon

Weaponization

Delivery

Exploitation

Escuela, estudio y materia

Institución
CS 6262
Grado
CS 6262

Información del documento

Subido en
30 de septiembre de 2025
Número de páginas
7
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
joshuawesonga22 Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
41
Miembro desde
9 meses
Número de seguidores
1
Documentos
11635
Última venta
1 día hace
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reseñas

5
1
4
0
3
1
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes