中文字幕综合一区,伊人av网,欧美中日韩在线,亚洲国产香蕉视频,黄视频在线免费,天天操天天爱天天爽,狠狠躁天天躁

軟題庫 學習課程
試卷年份2017年上半年
試題題型【單選題】
試題內容

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB  is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.

(1)A.message  B、information  C、requests  D、data
(2)A.methods  B、cases       C、hands    D、sections
(3)A.bad      B、real        C、fake      D、new
(4)A.user     B、administrator  C、editor   D、attacker
(5)A.or       B、of          C、in        D、to

查看答案

相關試題

68題: 2017年6月1日,()開始施行。
A.中華人民共和國計算機信息系統(tǒng)安全保護條例
B.計算機信息系統(tǒng)國際聯(lián)網(wǎng)保密管理規(guī)定
C.中華人民共和國網(wǎng)絡安全法
D.中華人民共和國電子簽名法
答案解析與討論:www.jazzmuze.com/st/32754695.html

69題: 面向數(shù)據(jù)挖掘的隱私保護技術主要解決高層應用中的隱私保護問題,致力于研究如何根據(jù)不同數(shù)據(jù)挖掘操作的特征來實現(xiàn)對隱私的保護。從數(shù)據(jù)挖掘的角度看,不屬于隱私保護技術的是()。
A.基于數(shù)據(jù)失真的隱私保護技術
B.基于數(shù)據(jù)匿名化的隱私保護技術
C.基于數(shù)據(jù)分析的隱私保護技術
D.基于數(shù)據(jù)加密的隱私保護技術
答案解析與討論:www.jazzmuze.com/st/3275518417.html

70題: 強制訪問控制(MAC)是一種不允許主體干涉的訪問控制類型。根據(jù)MAC的安全基本,用戶與訪問的信息的讀寫關系有四種類型,其中能保證數(shù)據(jù)完整性的讀寫組合方式是()。
A.上讀-下寫
B.上讀-上寫
C.下讀-下寫
D.下讀-上寫
答案解析與討論:www.jazzmuze.com/st/3275612511.html



×

预约信管网直播

  • 信管网视频号

  • 信管网抖音号

(周一至周五 16:30-17:30)

信管软考李老师

无特殊情况一般晚上8点直播

很高兴能和大家一路同行

下面是我的微信和抖音号,一起加油!

信管软考李老师

直播时间:晚上8点

免费观看

12年+

专业培训机构

PMI®注册

教育机构

10年+

专业教研团队

无忧保障,不

过免费重学

先试学,后报名,不过免费重学
提交即代表同意以手机号码开通试学账号及联系