100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CS6262 Lecture Quizzes Answered And Graded

Puntuación
-
Vendido
-
Páginas
20
Grado
A+
Subido en
22-03-2025
Escrito en
2024/2025

Random Scanning - Correct Answer Each compromised computer probes random addresses. Permutation Scanning - Correct Answer All compromised computers shared a common pseudo-random permutation of the IP address space. Signpost Scanning - Correct Answer Uses the communication patterns of the compromised computer to find new target. Hitlist Scanning - Correct Answer A portion of a list of targets is supplied to a compromised computer. Subnet spoofing - Correct Answer Generate random addresses with a given address space Random spoofing - Correct Answer Generate 32-bit numbers and stamp packets with them. Fixed spoofing - Correct Answer The spoofed address is the address of the target. Server Application - Correct Answer The attack is targeted to a specific application on a server. What is a "network access" attack used for? - Correct Answer The attack is used to overload or crash the communication mechanism of a network. Infrastructure - Correct Answer The motivation of this attack is a crucial service of a global internet operation, for example a core router. Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? - Correct Answer • a small command can generate a large response. • Vulnerable to source IP spoofing. • It is difficult to ensure computers communicate only with legitimate NTP servers. SYN Cookie - True Statement - Correct Answer The server must reject all TCP options because the server discards the SYN queue entry. True statements regarding UDP flood attacks - Correct Answer • Attackers can spoof the IP address of their UDP packets. • Firewalls cannot stop a flood because the firewall is susceptible to flooding. True statements regarding CAPTCHA puzzles - Correct Answer • Client puzzles should be stateless. • Puzzle complexity should increase as the strength of the attack increases. What assumptions can be made about trace backs? - Correct Answer Attackers may work alone or in groups What assumptions can be made regarding edge sampling? - Correct Answer • Multiple attackers can be identified since edge identifies splits in reverse path. • Requires space in the IP packet header. Self defense against reflector attacks should incorporate the following: - Correct Answer • Server redundancy - servers should be located in multiple networks and locations. • Traffic limiting - traffic from a name server should be limited to reasonable thresholds. Deep Web - Correct Answer It is not indexed by standard search engines

Mostrar más Leer menos
Institución
CS6262
Grado
CS6262










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CS6262
Grado
CS6262

Información del documento

Subido en
22 de marzo de 2025
Número de páginas
20
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CS6262 Lecture Quizzes Answered And Graded
Random Scanning - Correct Answer Each compromised computer probes random
addresses.

Permutation Scanning - Correct Answer All compromised computers shared a
common pseudo-random permutation of the IP address space.

Signpost Scanning - Correct Answer Uses the communication patterns of the
compromised computer to find new target.

Hitlist Scanning - Correct Answer A portion of a list of targets is supplied to a
compromised computer.

Subnet spoofing - Correct Answer Generate random addresses with a given address
space

Random spoofing - Correct Answer Generate 32-bit numbers and stamp packets with
them.

Fixed spoofing - Correct Answer The spoofed address is the address of the target.

Server Application - Correct Answer The attack is targeted to a specific application on
a server.

What is a "network access" attack used for? - Correct Answer The attack is used to
overload or crash the communication mechanism of a network.

Infrastructure - Correct Answer The motivation of this attack is a crucial service of a
global internet operation, for example a core router.

Why is the UDP-based NTP protocol particularly vulnerable to amplification attacks? -
Correct Answer • a small command can generate a large response.
• Vulnerable to source IP spoofing.
• It is difficult to ensure computers communicate only with legitimate NTP servers.

SYN Cookie - True Statement - Correct Answer The server must reject all TCP options
because the server discards the SYN queue entry.

True statements regarding UDP flood attacks - Correct Answer • Attackers can spoof
the IP address of their UDP packets.
• Firewalls cannot stop a flood because the firewall is susceptible to flooding.

True statements regarding CAPTCHA puzzles - Correct Answer • Client puzzles
should be stateless.
• Puzzle complexity should increase as the strength of the attack increases.

,What assumptions can be made about trace backs? - Correct Answer Attackers may
work alone or in groups

What assumptions can be made regarding edge sampling? - Correct Answer • Multiple
attackers can be identified since edge identifies splits in reverse path.
• Requires space in the IP packet header.

Self defense against reflector attacks should incorporate the following: - Correct Answer
• Server redundancy - servers should be located in multiple networks and locations.
• Traffic limiting - traffic from a name server should be limited to reasonable thresholds.

Deep Web - Correct Answer It is not indexed by standard search engines

Dark Web - Correct Answer Web content that exists on darknets

Surface Web - Correct Answer Readily available to the public, and searchable with
standard search engines.

Doorway pages - Correct Answer A webpage that lists many keywords, in hopes of
increasing search engine ranking. Scripts on the page redirect to the attackers page.

Crypters - Correct Answer A program that hides malicious code from anti-virus
software.

Blackhat Search Engine Optimizer - Correct Answer It increases traffic to the attacker's
site by manipulating search engines.

Trojan Download Manager - Correct Answer Software that allows an attacker to
update or install malware on a victim's computer.

Name two identifying characteristics of Spam: - Correct Answer 1) Inappropriate or
irrelevant
2) Large number of recipients

Name the top three countries where spam directed visitors added items to their
shopping carts: - Correct Answer 1) United States
2) Canada
3) Philippines

Which events should trigger a penetration test?
• Infastructure is added or modified
• Applications are added of modified
• End user policies are changed
• Security patches are installed - Correct Answer • Infastructure is added or modified
• Applications are added of modified
• End user policies are changed

, • Security patches are installed

Steps attackers used to access RSA's Adobe Flash software: - Correct Answer •
Identify employees that are vulnerable
• Craft an email subject line that entices an employee to open it.
• Hide an executable file in the email that will install onto the victim's computer when the
email is opened.

(Describe the social engineering tool) Flash or CD Autoplay - Correct Answer A flash is
created that has a program that creates a connection to the exploit server.

(Describe the social engineering tool) Reverse Shell Applet - Correct Answer A signed
Java applet is sent to the user, if they accept it, a shell is sent back to the exploit server.

(Describe the social engineering tool) Click Logger - Correct Answer used to determine
which users click on links in emails.

(Describe the social engineering tool) Download Connection - Correct Answer An
email contains an attachment. When the attachment is downloaded a connection is
made to the exploit server.

Top three industries that were targets of cyber attacks in 2016 - Correct Answer 1)
Defense contractor
2) Restaurant
3) Software

(Describe the motivation) Liking - Correct Answer A desire to fit and to be more easily
influenced by someone you like.

(Describe the motivation) Scarcity - Correct Answer A desire to pursue a limited or
exclusive item or service.

(Describe the motivation) Commitment - Correct Answer A desire to act in a consistent
manner

(Describe the motivation) Social Proof - Correct Answer Looking to others for clues on
how to behave.

(Describe this attack) Using components with known vulnerabilities - Correct Answer
Uses unpatched third party components

(Describe this attack) Missing function level access control - Correct Answer Privilege
functionality is hidden rather than enforced through access controls.

(Describe this attack) Sensitive data exposure - Correct Answer Abuses lack of data
encryption
$7.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Lydiah247 West Virgina University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
29
Miembro desde
2 año
Número de seguidores
10
Documentos
2870
Última venta
1 mes hace
SHINE

Welcome to my page- you are able to get revision questions,Summary notes and Exams that help you pass .

2.2

5 reseñas

5
1
4
0
3
1
2
0
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes