首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
21
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(3)
选项
A、bad
B、real
C、fake
D、new
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/FgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2014下项管)项目整体评估是把项目看成一个整体,权衡各种要素之间关系的评估,整体性体现在对______等方面的集成。
(2011下项管)绩效评估实施过程的首要任务是______。
(2007上监理)经国务院发展计划部门审批的大型工程项目,关于其可行性研究报告的表述正确的是______。
(2014下集管)目前,在电子商务交易过程中支付方式很多。按照支付的流程不同,主要存在四种电子商务支付模式:支付网关模式、网上银行模式、第三方支付模式和手机支付模式。______不属于第三方支付模式。
(2009下架构)Windows操作系统在图形用户界面处理方面采用的核心架构风格是______(1)风格。Java语言宣传的“一次编写,到处运行”的特性,从架构风格上看符合_____(2)风格的特点。(2)
(2009下项管)下列技术规范中,______不是软件中间件的技术规范。
(2013上项管)在下面的项目网络图中(时间单位为天),活动B的自由时差和总时差分别为______(1),如果活动A的实际开始时间是5月1日早8时,在不延误项目工期的情况下,活动B最晚应在______(2)前结束。(2)
(2010上项管)一个密码系统,通常简称为密码体制。可由五元组(M,C,K,E,D)构成密码体制模型,以下有关叙述中,______是不正确的。
WebSQLisaSQL-like(71)languageforextractinginformationfromtheWeb.ItscapabilitiesforperformingnavigationofWeb(72)ma
阅读下列说明,回答问题1至问题4,将解答填入答题纸的对应栏内。【说明】恶意代码是指为达到恶意目的而专门设计的程序或者代码。常见的恶意代码类型有:特洛伊木马、蠕虫、病毒、后门、Rootkit、僵尸程序、广告软件。2017年5月,勒索软件
随机试题
武昌起义后,中国革命出现何种复杂情况?
山楂的归经是
低蛋白治疗膳食应用的主要目的是()。
男性,35岁。烧伤总面积70%,Ⅲ度烧伤60%,在院外度过休克期,创面有感染,伤后4天入院,近2天来腹泻、黑粪,以往无溃疡病史。在明确诊断后,首先采取的治疗是
男性,60岁。以上腹部疼痛、食欲不振、体重减轻主诉就珍。胃镜检查示胃窦部小弯侧可见一直径约3cm肿块。
不可抗力一般包括自然事件和社会事件,以下属于社会事件的有()。
下列哪一项不属于“推定医疗机构有过错”的情形?()
开展党的群众路线教育实践活动要围绕保持党的先进性和纯洁性这条主线。()
Mutualrespectforterritorial______isoneofthebasesuponwhichourtwocountriesdeveloprelationships.
这部电影我已经看过好几遍了。
最新回复
(
0
)