Attacks via a Representative Sample : Myths and Reality