100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CS 6262 Quiz 1 Questions with Correct Answers Latest Version

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
30-09-2025
Escrito en
2025/2026

CS 6262 Quiz 1 Questions with Correct Answers Latest Version Random Scanning - Answers Each compromised computer probes random addresses. Permutation Scanning - Answers All compromised computers shared a common pseudo-random permutation of the IP address space. Signpost Scanning - Answers Uses the communication patterns of the compromised computer to find new target. Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer. Subnet spoofing - Answers Generate random addresses with a given address space Random spoofing - Answers Generate 32-bit numbers and stamp packets with them. Fixed spoofing - Answers The spoofed address is the address of the target. Server Application - Answers The attack is targeted to a specific application on a server. Network Access Attack - Answers The attack is used to overload or crash the communication mechanism of a network. Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global internet operation, for example a core router. Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers • a small command can generate a large response. • Vulnerable to source IP spoofing. • It is difficult to ensure computers communicate only with legitimate NTP servers. SYN Cookie - Answers The server must reject all TCP options because the server discards the SYN queue entry. UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets. • Firewalls cannot stop a flood because the firewall is susceptible to flooding. CAPTCHA Puzzles - Answers • Client puzzles should be stateless. • Puzzle complexity should increase as the strength of the attack increases. What assumptions can be made about trace backs? - Answers Attackers may work alone or in groups Edge Sampling What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can be identified since edge identifies splits in reverse path. • Requires space in the IP packet header. Reflector Attacks Self defense against reflector attacks should incorporate the following: - Answers • Server redundancy - servers should be located in multiple networks and locations. • Traffic limiting - traffic from a name server should be limited to reasonable thresholds. Deep Web - Answers It is not indexed by standard search engines Dark Web - Answers Web content that exists on darknets Surface Web - Answers Readily available to the public, and searchable with standard search engines. Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page. Crypters - Answers A program that hides malicious code from anti-virus software. Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by manipulating search engines. Trojan Download Manager - Answers Software that allows an attacker to update or install malware on a victim's computer. Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant 2) Large number of recipients Name the top three countries where spam directed visitors added items to their shopping carts: - Answers 1) United States 2) Canada 3) Philippines Which events should trigger a penetration test? • Infastructure is added or modified • Applications are added of modified • End user policies are changed • Security patches are installed - Answers • Infastructure is added or modified

Mostrar más Leer menos
Institución
CS 6262
Grado
CS 6262

Vista previa del contenido

CS 6262 Quiz 1 Questions with Correct Answers Latest Version 2025-2026

Random Scanning - Answers Each compromised computer probes random addresses.

Permutation Scanning - Answers All compromised computers shared a common pseudo-
random permutation of the IP address space.

Signpost Scanning - Answers Uses the communication patterns of the compromised computer
to find new target.

Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer.

Subnet spoofing - Answers Generate random addresses with a given address space

Random spoofing - Answers Generate 32-bit numbers and stamp packets with them.

Fixed spoofing - Answers The spoofed address is the address of the target.

Server Application - Answers The attack is targeted to a specific application on a server.

Network Access Attack - Answers The attack is used to overload or crash the communication
mechanism of a network.

Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global
internet operation, for example a core router.

Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers •
a small command can generate a large response.

• Vulnerable to source IP spoofing.

• It is difficult to ensure computers communicate only with legitimate NTP servers.

SYN Cookie - Answers The server must reject all TCP options because the server discards the
SYN queue entry.

UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets.

• Firewalls cannot stop a flood because the firewall is susceptible to flooding.

CAPTCHA Puzzles - Answers • Client puzzles should be stateless.

• Puzzle complexity should increase as the strength of the attack increases.

What assumptions can be made about trace backs? - Answers Attackers may work alone or in
groups

Edge Sampling

, What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can
be identified since edge identifies splits in reverse path.

• Requires space in the IP packet header.

Reflector Attacks

Self defense against reflector attacks should incorporate the following: - Answers • Server
redundancy - servers should be located in multiple networks and locations.

• Traffic limiting - traffic from a name server should be limited to reasonable thresholds.

Deep Web - Answers It is not indexed by standard search engines

Dark Web - Answers Web content that exists on darknets

Surface Web - Answers Readily available to the public, and searchable with standard search
engines.

Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search
engine ranking. Scripts on the page redirect to the attackers page.

Crypters - Answers A program that hides malicious code from anti-virus software.

Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by
manipulating search engines.

Trojan Download Manager - Answers Software that allows an attacker to update or install
malware on a victim's computer.

Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant

2) Large number of recipients

Name the top three countries where spam directed visitors added items to their shopping carts:
- Answers 1) United States

2) Canada

3) Philippines

Which events should trigger a penetration test?

• Infastructure is added or modified

• Applications are added of modified

• End user policies are changed

Escuela, estudio y materia

Institución
CS 6262
Grado
CS 6262

Información del documento

Subido en
30 de septiembre de 2025
Número de páginas
8
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
joshuawesonga22 Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
41
Miembro desde
9 meses
Número de seguidores
1
Documentos
11635
Última venta
1 día hace
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reseñas

5
1
4
0
3
1
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes