100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CS 6262 Quiz 1 Questions with Correct Answers Latest Version

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
30-09-2025
Geschreven in
2025/2026

CS 6262 Quiz 1 Questions with Correct Answers Latest Version Random Scanning - Answers Each compromised computer probes random addresses. Permutation Scanning - Answers All compromised computers shared a common pseudo-random permutation of the IP address space. Signpost Scanning - Answers Uses the communication patterns of the compromised computer to find new target. Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer. Subnet spoofing - Answers Generate random addresses with a given address space Random spoofing - Answers Generate 32-bit numbers and stamp packets with them. Fixed spoofing - Answers The spoofed address is the address of the target. Server Application - Answers The attack is targeted to a specific application on a server. Network Access Attack - Answers The attack is used to overload or crash the communication mechanism of a network. Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global internet operation, for example a core router. Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers • a small command can generate a large response. • Vulnerable to source IP spoofing. • It is difficult to ensure computers communicate only with legitimate NTP servers. SYN Cookie - Answers The server must reject all TCP options because the server discards the SYN queue entry. UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets. • Firewalls cannot stop a flood because the firewall is susceptible to flooding. CAPTCHA Puzzles - Answers • Client puzzles should be stateless. • Puzzle complexity should increase as the strength of the attack increases. What assumptions can be made about trace backs? - Answers Attackers may work alone or in groups Edge Sampling What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can be identified since edge identifies splits in reverse path. • Requires space in the IP packet header. Reflector Attacks Self defense against reflector attacks should incorporate the following: - Answers • Server redundancy - servers should be located in multiple networks and locations. • Traffic limiting - traffic from a name server should be limited to reasonable thresholds. Deep Web - Answers It is not indexed by standard search engines Dark Web - Answers Web content that exists on darknets Surface Web - Answers Readily available to the public, and searchable with standard search engines. Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page. Crypters - Answers A program that hides malicious code from anti-virus software. Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by manipulating search engines. Trojan Download Manager - Answers Software that allows an attacker to update or install malware on a victim's computer. Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant 2) Large number of recipients Name the top three countries where spam directed visitors added items to their shopping carts: - Answers 1) United States 2) Canada 3) Philippines Which events should trigger a penetration test? • Infastructure is added or modified • Applications are added of modified • End user policies are changed • Security patches are installed - Answers • Infastructure is added or modified

Meer zien Lees minder
Instelling
CS 6262
Vak
CS 6262

Voorbeeld van de inhoud

CS 6262 Quiz 1 Questions with Correct Answers Latest Version 2025-2026

Random Scanning - Answers Each compromised computer probes random addresses.

Permutation Scanning - Answers All compromised computers shared a common pseudo-
random permutation of the IP address space.

Signpost Scanning - Answers Uses the communication patterns of the compromised computer
to find new target.

Hitlist Scanning - Answers A portion of a list of targets is supplied to a compromised computer.

Subnet spoofing - Answers Generate random addresses with a given address space

Random spoofing - Answers Generate 32-bit numbers and stamp packets with them.

Fixed spoofing - Answers The spoofed address is the address of the target.

Server Application - Answers The attack is targeted to a specific application on a server.

Network Access Attack - Answers The attack is used to overload or crash the communication
mechanism of a network.

Infrastructure Attack - Answers The motivation of this attack is a crucial service of a global
internet operation, for example a core router.

Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Answers •
a small command can generate a large response.

• Vulnerable to source IP spoofing.

• It is difficult to ensure computers communicate only with legitimate NTP servers.

SYN Cookie - Answers The server must reject all TCP options because the server discards the
SYN queue entry.

UDP Flood Attacks - Answers • Attackers can spoof the IP address of their UDP packets.

• Firewalls cannot stop a flood because the firewall is susceptible to flooding.

CAPTCHA Puzzles - Answers • Client puzzles should be stateless.

• Puzzle complexity should increase as the strength of the attack increases.

What assumptions can be made about trace backs? - Answers Attackers may work alone or in
groups

Edge Sampling

, What assumptions can be made regarding edge sampling? - Answers • Multiple attackers can
be identified since edge identifies splits in reverse path.

• Requires space in the IP packet header.

Reflector Attacks

Self defense against reflector attacks should incorporate the following: - Answers • Server
redundancy - servers should be located in multiple networks and locations.

• Traffic limiting - traffic from a name server should be limited to reasonable thresholds.

Deep Web - Answers It is not indexed by standard search engines

Dark Web - Answers Web content that exists on darknets

Surface Web - Answers Readily available to the public, and searchable with standard search
engines.

Doorway pages - Answers A webpage that lists many keywords, in hopes of increasing search
engine ranking. Scripts on the page redirect to the attackers page.

Crypters - Answers A program that hides malicious code from anti-virus software.

Blackhat Search Engine Optimizer - Answers It increases traffic to the attacker's site by
manipulating search engines.

Trojan Download Manager - Answers Software that allows an attacker to update or install
malware on a victim's computer.

Name two identifying characteristics of Spam: - Answers 1) Inappropriate or irrelevant

2) Large number of recipients

Name the top three countries where spam directed visitors added items to their shopping carts:
- Answers 1) United States

2) Canada

3) Philippines

Which events should trigger a penetration test?

• Infastructure is added or modified

• Applications are added of modified

• End user policies are changed

Geschreven voor

Instelling
CS 6262
Vak
CS 6262

Documentinformatie

Geüpload op
30 september 2025
Aantal pagina's
8
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€9,60
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
41
Lid sinds
9 maanden
Aantal volgers
1
Documenten
11636
Laatst verkocht
1 dag geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3,3

3 beoordelingen

5
1
4
0
3
1
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen