Package deal
CS 6262 EXAMS BUNDLE | Questions with 100% Correct Answers)
CS 6262 EXAMS BUNDLE | Questions with 100% Correct Answers)
[Show more]CS 6262 EXAMS BUNDLE | Questions with 100% Correct Answers)
[Show more]Random Scanning - ANSWER Each comprised computer probes random addresses 
Permutation Scanning - ANSWER All comprised computers share a common psuedo- 
random permutation of the IP address space 
Signpost Scanning - ANSWER Uses the communication patterns of the comprised 
computer to find a new targ...
Preview 2 out of 14 pages
Add to cartRandom Scanning - ANSWER Each comprised computer probes random addresses 
Permutation Scanning - ANSWER All comprised computers share a common psuedo- 
random permutation of the IP address space 
Signpost Scanning - ANSWER Uses the communication patterns of the comprised 
computer to find a new targ...
T/F: An attacker that uses large botnet to make requests to a server to flood is an 
example of amplification attack. - ANSWER True 
T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - 
ANSWER False 
Which of the following actors are part of the cyber crime undergrou...
Preview 2 out of 15 pages
Add to cartT/F: An attacker that uses large botnet to make requests to a server to flood is an 
example of amplification attack. - ANSWER True 
T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. - 
ANSWER False 
Which of the following actors are part of the cyber crime undergrou...
Random Scanning - ANSWER Each compromised computer probes random addresses. 
Permutation Scanning - ANSWER All compromised computers shared a common 
pseudo-random permutation of the IP address space. 
Signpost Scanning - ANSWER Uses the communication patterns of the compromised 
computer to find ne...
Preview 3 out of 23 pages
Add to cartRandom Scanning - ANSWER Each compromised computer probes random addresses. 
Permutation Scanning - ANSWER All compromised computers shared a common 
pseudo-random permutation of the IP address space. 
Signpost Scanning - ANSWER Uses the communication patterns of the compromised 
computer to find ne...
RPKI - ANSWER • Secure AS for BGP 
• AS obtain a cert (ROA) from regional authority (RIR) 
Name two types of amplification attacks and describe them. - ANSWER DoS Bug: 
Design flaw allowing one Machine to disrupt a service 
DoS Flood: Command botnet to generate flood of requests. 
Describe a DoS...
Preview 2 out of 14 pages
Add to cartRPKI - ANSWER • Secure AS for BGP 
• AS obtain a cert (ROA) from regional authority (RIR) 
Name two types of amplification attacks and describe them. - ANSWER DoS Bug: 
Design flaw allowing one Machine to disrupt a service 
DoS Flood: Command botnet to generate flood of requests. 
Describe a DoS...
Cs 6262 quizzes with 100% Correct Answers 
T/F: An amplification attack occurs when an attacker sends a small number of packets 
to elicit a much larger response from a server or service, overwhelming the intended 
target. - ANSWER true 
T/F: TCP has the necessary safeguards in place to prevent netw...
Preview 2 out of 7 pages
Add to cartCs 6262 quizzes with 100% Correct Answers 
T/F: An amplification attack occurs when an attacker sends a small number of packets 
to elicit a much larger response from a server or service, overwhelming the intended 
target. - ANSWER true 
T/F: TCP has the necessary safeguards in place to prevent netw...
Everyone who frequents underground forums is cybercriminal or intends to be one. - 
ANSWER False 
For DDoS traceback (Savage et al. '00) a path can be reconstructed even if just one 
packet through the path is obtained. - ANSWER False 
If a botnet uses randomly generated domains each day for comman...
Preview 2 out of 7 pages
Add to cartEveryone who frequents underground forums is cybercriminal or intends to be one. - 
ANSWER False 
For DDoS traceback (Savage et al. '00) a path can be reconstructed even if just one 
packet through the path is obtained. - ANSWER False 
If a botnet uses randomly generated domains each day for comman...
A bug is different from a vulnerability in that a bug can be exploited and a vulnerability 
cannot - ANSWER False 
Which of the following are memory corruption vulnerabilities? - ANSWER Stack 
Overflow 
Use after Free 
What is the difference between a vulnerability and a control flow hijack - ANSWER...
Preview 2 out of 10 pages
Add to cartA bug is different from a vulnerability in that a bug can be exploited and a vulnerability 
cannot - ANSWER False 
Which of the following are memory corruption vulnerabilities? - ANSWER Stack 
Overflow 
Use after Free 
What is the difference between a vulnerability and a control flow hijack - ANSWER...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
No, you only buy these notes for $26.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
78121 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now