Wizgrades
On this page, you find all documents, package deals, and flashcards offered by seller WIZGrades.
- 2591
- 0
- 0
Community
- Followers
- Following
2591 items
CS6262 UPDATED Exam Questions And CORRECT Answers
T/F: An attacker that uses large botnet to make requests to a server to flood is an example of 
amplification attack. True 
T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. 
False 
Which of the following actors are part of the cyber crime underground economy? 
Exploit Developers 
Botnet Masters 
Spammers 
All of the above All of the above
- Exam (elaborations)
- • 14 pages •
T/F: An attacker that uses large botnet to make requests to a server to flood is an example of 
amplification attack. True 
T/F: Unlike UDP, TCP has the necessary safeguards in place to prevent network DoS. 
False 
Which of the following actors are part of the cyber crime underground economy? 
Exploit Developers 
Botnet Masters 
Spammers 
All of the above All of the above
CS6262 KeY Tested Exam Questions And CORRECT Answers
Random ScanningEach comprised computer probes random addresses 
Permutation ScanningAll comprised computers share a common psuedo-random 
permutation of the IP address space 
Signpost ScanningUses the communication patterns of the comprised computer to find 
a new target 
Hit List ScanningA portion of a list of targets is supplied to a comprised computer 
Subnet SpoofingGenerate random addresses within a given address space 
Random SppofingGenerate 32-bit numbers and stamp packets with them 
F...
- Exam (elaborations)
- • 13 pages •
Random ScanningEach comprised computer probes random addresses 
Permutation ScanningAll comprised computers share a common psuedo-random 
permutation of the IP address space 
Signpost ScanningUses the communication patterns of the comprised computer to find 
a new target 
Hit List ScanningA portion of a list of targets is supplied to a comprised computer 
Subnet SpoofingGenerate random addresses within a given address space 
Random SppofingGenerate 32-bit numbers and stamp packets with them 
F...
CS6262 TOP Exam Questions And CORRECT Answers
A bug is different from a vulnerability in that a bug can be exploited and a vulnerability 
cannot False 
Which of the following are memory corruption vulnerabilities? Stack Overflow 
Use after Free 
What is the difference between a vulnerability and a control flow hijack The hijack is a 
way you can exploit a vulnerability 
A __________ attack is a type of ____________. The ROP is used because the code many 
not contain many useful gadgets 1. ROP 
2. Return to Libc
- Exam (elaborations)
- • 9 pages •
A bug is different from a vulnerability in that a bug can be exploited and a vulnerability 
cannot False 
Which of the following are memory corruption vulnerabilities? Stack Overflow 
Use after Free 
What is the difference between a vulnerability and a control flow hijack The hijack is a 
way you can exploit a vulnerability 
A __________ attack is a type of ____________. The ROP is used because the code many 
not contain many useful gadgets 1. ROP 
2. Return to Libc
CS 1332 TOP Study Guide Questions and CORRECT Answers
ArrayList Constructor() 
(code) ngArray = (T[]) new Object[INITIAL_CAPACITY]; 
 = 0; 
ArrayList RemoveAtIndex() 
(code) BIG O - O(n) 
Steps: 
1. Store element to return 
2. edge case - removing from end 
3. edge case - list empty 
4. shift element to be removed to back of the list and null out 
{ 
T element = backingArray[index];
- Exam (elaborations)
- • 29 pages •
ArrayList Constructor() 
(code) ngArray = (T[]) new Object[INITIAL_CAPACITY]; 
 = 0; 
ArrayList RemoveAtIndex() 
(code) BIG O - O(n) 
Steps: 
1. Store element to return 
2. edge case - removing from end 
3. edge case - list empty 
4. shift element to be removed to back of the list and null out 
{ 
T element = backingArray[index];
CS3321 TOP Study Guide Exam Questions and CORRECT Answers
How would you characterize the physical size of a mainframe computer (not including its I/O 
(or peripheral) equipment)? 
A) About the size of a pickup truck 
B) About the size of a large refrigerator 
C) About the size of a large hotel ballroom 
D) About the size of a desktop computer 
E) About the size of a microwave oven - B) About the size of a large refrigerator 
Which mainframe job/role would you expect to perform software customization, capacity 
planning and performance tuning? 
A)...
- Exam (elaborations)
- • 21 pages •
How would you characterize the physical size of a mainframe computer (not including its I/O 
(or peripheral) equipment)? 
A) About the size of a pickup truck 
B) About the size of a large refrigerator 
C) About the size of a large hotel ballroom 
D) About the size of a desktop computer 
E) About the size of a microwave oven - B) About the size of a large refrigerator 
Which mainframe job/role would you expect to perform software customization, capacity 
planning and performance tuning? 
A)...
CS 1332 Certification Questions and CORRECT Answers
Adaptivefaster when data is already sorted 
Stableequal valued elements are in the same relative order before and after sorting 
In-Placedoes not need an additional data structure besides the array already storing the 
data. O(1) extra memory 
Iterative Sortssort one at a time 
Divide and Conquer Sortsbreak the original large problem into sub-problems, solve, 
and then combine solutions to solve large problem (mostly recursive) 
Non-Comparison Based Sortsat no point can we compare two objects ...
- Exam (elaborations)
- • 5 pages •
Adaptivefaster when data is already sorted 
Stableequal valued elements are in the same relative order before and after sorting 
In-Placedoes not need an additional data structure besides the array already storing the 
data. O(1) extra memory 
Iterative Sortssort one at a time 
Divide and Conquer Sortsbreak the original large problem into sub-problems, solve, 
and then combine solutions to solve large problem (mostly recursive) 
Non-Comparison Based Sortsat no point can we compare two objects ...
CS 1332 UPDATED Questions and CORRECT Answers
parent BF = 2 
child BF = 0, 1 Right Rotation 
parent BF = 2 
child BF = -1 Left-Right Rotation 
parent BF = -2 
child BF = -1, 0 Left Rotation 
parent BF = -2 
child BF = 1 Right-Left Rotation 
SkipLists - Search, Add, Remove, Space 
Best Case O(logn)
- Exam (elaborations)
- • 9 pages •
parent BF = 2 
child BF = 0, 1 Right Rotation 
parent BF = 2 
child BF = -1 Left-Right Rotation 
parent BF = -2 
child BF = -1, 0 Left Rotation 
parent BF = -2 
child BF = 1 Right-Left Rotation 
SkipLists - Search, Add, Remove, Space 
Best Case O(logn)
CRJ 350 UPDATED Exam Questions and CORRECT Answers
harm principle You are a state legislator and you have sponsored a bill requring that all 
passengers in cars must wears seat belts at all times, even in a rear seat. Opponents feel that 
this proposed law is over-reaching and is too restrictive of personal freedom. Opponents to 
your bill would say that your proposed law is a bad idea and violates the ________, since 
violators aren't actually harming anyone. 
those who control major social institutions determine how crime is defined Acco...
- Exam (elaborations)
- • 10 pages •
harm principle You are a state legislator and you have sponsored a bill requring that all 
passengers in cars must wears seat belts at all times, even in a rear seat. Opponents feel that 
this proposed law is over-reaching and is too restrictive of personal freedom. Opponents to 
your bill would say that your proposed law is a bad idea and violates the ________, since 
violators aren't actually harming anyone. 
those who control major social institutions determine how crime is defined Acco...
CRJ 350 Already Passed Exam Questions and CORRECT Answers
The "big picture" of crime can be manipulated or distorted limited personal experience 
self-serving reported by organizations with vested interests 
cultural values and myths 
____rates are realistic assessments of threat levels that criminal activities pose to particular 
individuals and groups victimization 
Statistics can be used to... see patterns of crime 
crime variation across time 
profile a typical victim
- Exam (elaborations)
- • 5 pages •
The "big picture" of crime can be manipulated or distorted limited personal experience 
self-serving reported by organizations with vested interests 
cultural values and myths 
____rates are realistic assessments of threat levels that criminal activities pose to particular 
individuals and groups victimization 
Statistics can be used to... see patterns of crime 
crime variation across time 
profile a typical victim
CRJ 350 TOP Exam Questions and CORRECT Answers
Which of the following best describes the word "infanticide"? 
a. the offender is a child 
b. the victim is a child 
c. witnesses are children 
d. where the survivors are children 
e. none of the aboveThe victim is a child 
Homicide is a leading cause of death among which one of the following demographic 
groups? 
a. young, black males 
b. young, black females 
c. young, white females 
d. older, black males 
e. older, white malesYoung, Black males
- Exam (elaborations)
- • 21 pages •
Which of the following best describes the word "infanticide"? 
a. the offender is a child 
b. the victim is a child 
c. witnesses are children 
d. where the survivors are children 
e. none of the aboveThe victim is a child 
Homicide is a leading cause of death among which one of the following demographic 
groups? 
a. young, black males 
b. young, black females 
c. young, white females 
d. older, black males 
e. older, white malesYoung, Black males