100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
30-09-2025
Geschreven in
2025/2026

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - Answers False Which of the following actors are part of the cyber crime underground economy? - Answers Exploit Developers, Botnet Masters, Spammers Which of the following is/are NOT a potential network level DoS mitigation? (hints: Which method is not for mitigating Dos? Which method is used for mitigating DoS attacks at the application level instead?) - Client Puzzles - CAPTCHAs - Use only TCP - Increase UDP 3-way handshake - Source Identification - Answers CAPTCHAs, Use only TCP, Increase UDP 3-way handshake T/F: In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected malicious JavaScript code in GitHub's web pages. - Answers False T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS - Answers False Select tools used for scanning in the Penetration methodology - nmap - john the ripper - siphon - fping - Answers - nmap - siphon - fping Suppose that a company owns two websites: A.com and B.com. Where a website of A.com dynamically gets resources from B.com via AJAX requests depending on the user's input, which of the following mechanisms can be adopted by the developers of B.com to allow A.com to gain access to their resources? - Cross Origin Resource Sharing - Content Security Policy - Allow Page Access Policy - Same Origin Policy - Answers Cross Origin Resource Sharing Which of the following is/are social engineering techniques: - Impersonation of Help Desk - Email Attachments - Tailgating - Pop-up windows - Answers Impersonation of Help Desk, Email Attachments, Tailgating, Pop-up windows T/F: Subresource integrity uses a cryptographic hash to ensure that webpage subresources have not changed on the way. - Answers True Which of the following is true for modern browsers that meet RFC6265, assuming the following cookie information? Cookie 1 information: name=cookie1; domain: ; path: /canvas Cookie 2 information: name=cookie2; domain: ; path: / - The browser can send cookie2 to host - As both cookies have the same path, the browser can send cookie1 to and . - can access the cookie2 since .com top-level domain (TLD) takes higher precedence than the .edu TLD. - None of the above - Answers The browser can send cookie2 to host Which of the following URLs is accessible from under the Same Origin Policy in modern browsers that meet RFC 6454, assuming the website uses the standard/default ports for HTTP and HTTPS? - - - - T/F: Cookies have integrity because a user cannot change and cannot delete cookie values. - Answers False Which of the following is NOT a recommended defense against social engineering attacks? - Allow repairmen and visitors to walk around the office or sensitive areas without an escort. - Limit information in auto-reply emails. - Never disclose passwords. - Question people you don't know. - Answers Allow repairmen and visitors to walk around the office or sensitive areas without an escort. T/F: A website """" is able to set or overwrite cookies from the website """". The server is not able to distinguish the overwritten cookies from the original cookies. This is an example of violation of session integrity. - Answers True

Meer zien Lees minder
Instelling
CS 6262
Vak
CS 6262

Voorbeeld van de inhoud

CS 6262 Network Security Quizzes Questions Answered Correctly Latest Update 2025-2026

T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - Answers
False

Which of the following actors are part of the cyber crime underground economy? - Answers
Exploit Developers, Botnet Masters, Spammers

Which of the following is/are NOT a potential network level DoS mitigation?

(hints: Which method is not for mitigating Dos? Which method is used for mitigating DoS
attacks at the application level instead?)

- Client Puzzles

- CAPTCHAs

- Use only TCP

- Increase UDP 3-way handshake

- Source Identification - Answers CAPTCHAs, Use only TCP, Increase UDP 3-way handshake

T/F: In 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected
malicious JavaScript code in GitHub's web pages. - Answers False

T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS - Answers
False

Select tools used for scanning in the Penetration methodology

- nmap

- john the ripper

- siphon

- fping - Answers - nmap

- siphon

- fping

Suppose that a company owns two websites: A.com and B.com. Where a website of A.com
dynamically gets resources from B.com via AJAX requests depending on the user's input, which
of the following mechanisms can be adopted by the developers of B.com to allow A.com to gain
access to their resources?

, - Cross Origin Resource Sharing

- Content Security Policy

- Allow Page Access Policy

- Same Origin Policy - Answers Cross Origin Resource Sharing

Which of the following is/are social engineering techniques:



- Impersonation of Help Desk

- Email Attachments

- Tailgating

- Pop-up windows - Answers Impersonation of Help Desk, Email Attachments, Tailgating, Pop-up
windows

T/F: Subresource integrity uses a cryptographic hash to ensure that webpage subresources
have not changed on the way. - Answers True

Which of the following is true for modern browsers that meet RFC6265, assuming the following
cookie information?

Cookie 1 information: name=cookie1; domain: cs6262.gatech.com; path: /canvas

Cookie 2 information: name=cookie2; domain: cs6262.gatech.edu; path: /



- The browser can send cookie2 to mail.cs6262.gatech.edu host

- As both cookies have the same path, the browser can send cookie1 to cs6262.gatech.com and
cs6262.gatech.edu.

- cs6262.gatech.com can access the cookie2 since .com top-level domain (TLD) takes higher
precedence than the .edu TLD.

- None of the above - Answers The browser can send cookie2 to mail.cs6262.gatech.edu host

Which of the following URLs is accessible from http://goodsecurity.com under the Same Origin
Policy in modern browsers that meet RFC 6454, assuming the website uses the
standard/default ports for HTTP and HTTPS?

Geschreven voor

Instelling
CS 6262
Vak
CS 6262

Documentinformatie

Geüpload op
30 september 2025
Aantal pagina's
10
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
41
Lid sinds
9 maanden
Aantal volgers
1
Documenten
11645
Laatst verkocht
1 dag geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3,3

3 beoordelingen

5
1
4
0
3
1
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen