CS6250 / CS 6250 Final Exam Quizzes (Latest Update 2025 / 2026) Computer Networks | Questions & Answers | 100% Correct | Grade A - Georgia Tech
Question:
Fast-Flux Service Networks (FFSNs) can be leveraged by malicious actors to extend the availability of a scam. (T/F)
Answer:
True
Question:
Using the fast flux technique to extend the availability of a scam domain name, it makes it impossible for the scam to be taken down. (T/F)
Answer:
False
- / 2
Question:
What is the main qualitative difference between rogue and legitimate networks?
a) The persistence of malicious behavior
b) The type of malicious behavior (e.g. scam hosting, Command and Control
servers hosting etc.).
Answer:
The persistence of malicious behavior
Question:
The FIRE system takes primarily a reactive approach to infer network reputation, relying on monitoring IP blacklists. (T/F)
Answer:
True
Question:
ASwatch takes primarily a proactive approach to infer network reputation by monitoring the routing behavior of networks. (T/F)
Answer:
True
- / 2