CS6262 FINAL EXAM NEWEST ACTUAL / UPDATED
QUESTIONS AND CORRECT ANSWERS VERIFIED/GRADED A+
Symbolic Execution - ----Answers---- Finds the command that drives the malware into that execution path
- Inputs symbolic variables, and tries to calculate expressions
- Move along path of conditional statements until it reaches
for the input along the execution
the target function
Manifest Analysis - ----Answers---- Identify suspicious components
- Broadcast receivers registering for suspicious actions
- Background services
Mahalanobis Distance - ----Answers---PAYL detection is based on the distance of normal traffic vs an incoming packet
Denial-of-Service attacks can happen at any layer of the OSI model. - ----Answers---True
Which of the following actors is most responsible for fueling counterfeit pharmaceutical goods? - ----Answers--- Consumers
- / 3
Which of the following statements about the Storm botnet is INCORRECT? - ----Answers---The Storm botnet uses a central command-and-control server
Which of the following statements about the Traffic Validation Architecture is correct? - ----Answers---The purpose of the Traffic Validation Architecture is to allow a sender and a receiver to communicate even if they are experiencing attacks from other hosts.
The Traffic Validation Architecture uses cryptography as part of its security mechanisms.
The Traffic Validation Architecture uses fair queuing to manage bandwidth.
The Traffic Validation Architecture uses capabilities in packets to defend against denial of service attacks.
Internet Exchanges are switches that allow several networks to connect and pass bandwidth. - ----Answers---True
Law enforcement participate in underground forums to conduct surveillance. - ----Answers---True
A Network Time Protocol (NTP) server runs on UDP port 123.An attacker can perform an amplification attack using NTP by 2 / 3
repeatedly sending small UDP packets to the server. - ---- Answers---True
Which of the following statements about spam is INCORRECT?Choose the "All of the other statements are correct" option if all the statements are correct. - ----Answers---Spam is usually sent to a large number of recipients.
Spam is used to spread malware.
Botnets are used to send spam.
The spam conversion rate is the percentage of spam messages that result in a sale.
n 2015, GitHub was a victim of a distributed denial of service attack. The attackers injected malicious JavaScript code in GitHub's web pages. - ----Answers---True
Which of the following statements about CAPTCHAs is INCORRECT? Choose the "All of the other statements are correct" option if all the statements are correct. - ---- Answers---CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart."
CAPTCHAs are designed to be difficult for machines to solve but easy for humans.
- / 3