Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CS6262 Final Exam Questions with Correct Answers | Latest Update Verified by Experts

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
21-04-2026
Written in
2025/2026

CS6262 Final Exam Questions with Correct Answers | Latest Update Verified by Experts

Institution
CS6262
Course
CS6262

Content preview

CS6262 Final Exam Questions with Correct
Answers | Latest Update Verified by
Experts

1. Which scanning technique involves each compromised computer probing
random IP addresses? - correct answer---- Random Scanning
Rationale:-Random scanning uses a random number generator to select
targets, causing each infected machine to probe addresses independently
without coordination.
2. Which scanning method uses a common pseudo-random permutation of
the IP address space shared among all compromised computers? - correct
answer---- Permutation Scanning
Rationale:-Permutation scanning ensures all infected machines traverse
the same pseudo-random sequence, avoiding overlap and reducing
duplicate probes.
3. What scanning technique leverages the existing communication patterns of
a compromised computer to discover new targets? - correct answer---
- Signpost Scanning
Rationale:-Signpost scanning examines network traffic, browser history, or
stored connections to find trusted or frequently contacted hosts.
4. In which scanning approach does the attacker supply a portion of a pre-
generated target list to each compromised machine? - correct answer---
- Hit List Scanning
Rationale:-Hit list scanning distributes a subset of vulnerable targets from
an initial reconnaissance list, speeding up propagation.
5. What spoofing technique generates random addresses within a specific
address range (e.g., a /24 subnet)? - correct answer---- Subnet Spoofing
Rationale:-Subnet spoofing restricts random address generation to a given
network prefix, often to evade filtering or target local networks.

,6. Which spoofing method generates completely random 32-bit numbers and
stamps packets with them? - correct answer---- Random Spoofing
Rationale:-Random spoofing selects source IPs uniformly from the entire
IPv4 space, making traceback difficult.
7. Fixed spoofing refers to which practice? - correct answer---- The spoofed
address is the address of the target
Rationale:-Fixed spoofing sets the source IP to the target's own address,
often causing the target to attack itself (reflection).
8. A DoS attack that targets a specific application on a server (e.g., Apache,
MySQL) is classified as: - correct answer---- Server Application
Rationale:-Application-layer DoS focuses on exhausting resources of a
particular service rather than network bandwidth.
9. An attack designed to overload or crash the communication mechanism of
a network (e.g., switch, router) is called: - correct answer---- Network
Access
Rationale:-Network access attacks target infrastructure components like
switches or firewalls using techniques such as MAC flooding.
10.An attack motivated by disrupting a crucial service of global internet
operation, such as a core router, is labeled: - correct answer---
- Infrastructure
Rationale:-Infrastructure attacks aim at critical nodes (DNS root servers,
backbone routers) to cause widespread damage.
11.A design flaw that allows one machine to disrupt a service (e.g., sending a
small packet that triggers a huge response) is a: - correct answer---- DoS
Bug (Amplification Attack)
Rationale:-DoS bugs exploit protocol vulnerabilities where a small request
generates a disproportionately large response.
12.Commanding botnets to generate a flood of requests toward a target is
known as: - correct answer---- DoS Flood (Amplification Attack)
Rationale:-DoS floods use many compromised machines to overwhelm a
target with traffic volume.

, 13.Why is UDP-based NTP particularly vulnerable to amplification attacks? -
correct answer---- Small command can generate a large response;
vulnerable to source IP spoofing; difficult to ensure legitimate
communication
Rationale:-NTP’s monlist request (small) yields a large response, and lack of
handshake allows spoofed source IPs.
14.Which of the following describes the IP header format characteristics? -
correct answer---- Connectionless, unreliable, no authentication
Rationale:-IP is a best-effort, connectionless protocol without built-in
authentication or reliability.
15.A SYN flood attack works by: - correct answer---- Sending a large amount
of SYN request packets to a server to exhaust its half-open connection
queue
Rationale:-The server allocates resources for each SYN, waiting for ACK that
never comes, depleting memory.
16.One mitigation for SYN floods is SYN cookies. How do they work? - correct
answer---- Remove state from server, encode connection info in the SYN-
ACK sequence number, incur performance overhead
Rationale:-SYN cookies avoid storing half-open connections; server
reconstructs state only if client returns valid ACK.
17.Crowdturfers are individuals who: - correct answer---- Crowdsource to
create, verify, and manage fake accounts; solve CAPTCHAs
Rationale:-Crowdturfing outsources account creation and CAPTCHA solving
to low-cost human workers.
18.The seven phases of penetration testing in order are: - correct answer---
- Footprinting, Scanning, Enumeration, Gaining Access, Escalating
Privileges, Pilfering, Covering Tracks, Creating Backdoors
Rationale:-Standard methodology: reconnaissance, vulnerability
identification, user extraction, exploitation, privilege escalation, data theft,
cleanup, persistence.

Written for

Institution
CS6262
Course
CS6262

Document information

Uploaded on
April 21, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Drlima Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
25
Member since
1 year
Number of followers
0
Documents
1229
Last sold
1 week ago
Drlima

Hi! ,I'mDrlima , a certified TeachMe2 Totur with over 5 helping University and college students succeed. I am a Verified Nursing Tutor specializing in Ihuman Case Studies, Advanced pharmacology (NR565), HESI, TEAS 7, Pediatrics and More, creating HIGH QUALITY,EXAM FOCUSED STUDY GUIDES. Every document is crafted to be clear, accurate, and easy understanding saving you study time and improving your grades. Whatever you are preparing for Hesi A2, NCLEX or University coursework ,my notes are trusted by hundreds of students like you. ✅ Backed by toturing experience. ✅ Organized by topic and exam need. ✅ Instant access and affordable pricing. Let's help you pass smarter ,not harder. Browse my store now !

Read more Read less
1.3

3 reviews

5
0
4
0
3
0
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions