首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
27
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(1)
选项
A、message
B、information
C、requests
D、data
答案
C
解析
转载请注明原文地址:https://jikaoti.com/ti/x2x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012下集管)某公司承接了城市道路信息系统建设项目,由于施工日期正好是7月份的雨季,项目团队为了管理好项目的进度,最好采用______进行进度管理。
(2008上项管)进度控制是避免工期拖延的一种方法。进度控制中的纠正行为通常加速某些活动以确保这些活动能够及时完成。为了重新编制和执行进度表,纠正行为通常要求______。
(2010上项管)某企业针对“新一代网络操作系统”开发项目进行可行性论证。在论证的最初阶段,一般情况下不会涉及到______。
(2013下项管)以下关于商业智能的说法中,______是不恰当的。
(2013上集管)自下而上估算方法是指估算单个工作包或细节详细活动的成本,然后将详细的成本汇总到更高层级估算的方法,下面关于该方法的描述中错误的是______。
(2010上集管)可以实现在Internet上任意两台计算机之间传输文件的协议是______。
(2012上项管)下面属于项目范围控制活动的是______。
(2008下项管)制造某种产品需要四道工序,每道工序可选用多种方法。下图列出了制造这种产品各道工序可选用的不同方法:从节点1开始,连续经过4条线段(表示4道工序所选用的方法),组成一条线路,直到节点12结束。每条线段上标记的数字表示利用相应方法每件产品可以
(2012下项管)某实验室准备建立一个由20台计算机组成的局域网。为节约费用,适宜采用通用的______(1)技术,采用交换机式HUB和双绞线进行组网,其网络拓扑结构为_____(2),HUB与微机工作站之间的最长距离为_____(3)米。(2)
(2014上项管)OSI安全体系结构定义了五种安全服务,其中_____(1)用于识别对象的身份并对身份核实。______(2)用于防止对资源的非授权访问,确保只有经过授权的实体才能访问受保护的资源。(2)
随机试题
分析《逍遥游》一文的论述思路。
按照销售工作数量来确定销售人员的数量的是()
“您感到生活幸福吗?”这种提问不符合问卷设计的哪个原则
奶牛产后65天内未见明显的发情表现,直肠检查卵巢上有一小的黄体遗迹,但无卵泡发育,卵巢的质地和形状无明显变化。治疗该病最适宜药物是
在合同工程履行期间,下列()事项可以归人现场签证的范围。
“合格境外机构投资者(QFII)的审批及监管,境外资产管理机构在华设立代表处的审批”属于中国证监会内设( )的职责。
1684年,清政府设置台湾府,隶属于()。
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1.describethepicturebrieflytosho
Whereistheconversationmostlikelytakingplace?
Whenaconsumerfindsthatanitemsheorheboughtisfaultyordoesnotliveuptothemanufacturer’sclaimforit,thefirst
最新回复
(
0
)