国产精品久久久久久免费免熟,五月婷婷激情综合网,欧美三级视频网站,一级少妇淫片,国产精品女教师av久久,啪啪免费视频,wwww黄色片

軟題庫 學習課程
當前位置:信管網 >> 在線考試中心 >> 信息安全工程師題庫 >> 試題查看
試卷年份2017年上半年
試題題型【單選題】
試題內容

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB  is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.

(1)A.message  B、information  C、requests  D、data
(2)A.methods  B、cases       C、hands    D、sections
(3)A.bad      B、real        C、fake      D、new
(4)A.user     B、administrator  C、editor   D、attacker
(5)A.or       B、of          C、in        D、to

查看答案

相關試題

68題: 2017年6月1日,()開始施行。
A.中華人民共和國計算機信息系統安全保護條例
B.計算機信息系統國際聯網保密管理規(guī)定
C.中華人民共和國網絡安全法
D.中華人民共和國電子簽名法
答案解析與討論:www.xcpkj.com/st/32754695.html

69題: 面向數據挖掘的隱私保護技術主要解決高層應用中的隱私保護問題,致力于研究如何根據不同數據挖掘操作的特征來實現對隱私的保護。從數據挖掘的角度看,不屬于隱私保護技術的是()。
A.基于數據失真的隱私保護技術
B.基于數據匿名化的隱私保護技術
C.基于數據分析的隱私保護技術
D.基于數據加密的隱私保護技術
答案解析與討論:www.xcpkj.com/st/3275518417.html

70題: 強制訪問控制(MAC)是一種不允許主體干涉的訪問控制類型。根據MAC的安全基本,用戶與訪問的信息的讀寫關系有四種類型,其中能保證數據完整性的讀寫組合方式是()。
A.上讀-下寫
B.上讀-上寫
C.下讀-下寫
D.下讀-上寫
答案解析與討論:www.xcpkj.com/st/3275612511.html