首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
28
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(1)
选项
A、message
B、information
C、requests
D、data
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/TgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2009下项管)根据企业内外环境的分析,运用SWOT配比技术就可以提出不同的企业战略。S-T战略是______。
(2009上软评)软件可靠性的理解,正确的是______。①软件可靠性是指在指定条件下使用时,软件产品维持规定的性能级别的能力;②软件可靠性的种种局限是由于随着时间的推移,软件需求和使用方式发生了变化;③软件可靠性包括成熟性、
(2008下系分)某公司支出20万元购买了某市场预测信息,由于此信息的采纳,某公司多得到了100万元的利润,对某公司而言,这个市场预测信息的______。
(2012上集管)网络协议和设备驱动软件经常采用分层架构模式,其主要原因是______。
(2011下集管)某项目小组在定义项目的工作构成时,设计了一份材料清单来代替工作分解结构WBS,客户在对材料清单进行评审时,发现其中缺少一项会导致范围变更的需求,后来这一变更需求被补充了进去。造成这次范围变更的主要原因是______。
(2009下系管)《计算机软件产品开发文件编制指南GB8567-88》是______标准。
(2007下系分)______为推荐性地方标准的代号。
(2006下网工)ARP协议的作用是____(1),ARP报文封装在_____(2)中传送。(1)
(2010上项管)在软件开发项目中,关键路径是项目事件网络中______(1),组成关键路径的活动称为关键活动。下图中的关键路径历时______(2)个时间单位。(2)
Performing(49)involvesmonitoringspecificprojectresultstodetermineiftheycomplywithrelevantqualitystandardsandident
随机试题
A.凝固性坏死B.液化性坏死C.湿性坏疽D.干酪样坏死E.干性坏疽肾梗死属于
女性,52岁,因结节性甲状腺肿接受了甲状腺大部切除术。术中顺利,术后安返病房。为能够及时应对可能发生的呼吸道并发症,其床边必须准备
刘某,女,21岁。近日气候骤冷,调摄不慎,出现恶风畏寒,头痛时作,痛连项背,遇风尤剧,不渴,苔薄白,脉浮紧。证属:
左心衰竭最早出现的症状是
建设工程施工完成后,()应在正式验收前组织工程竣工预验收,在预验收中发现的问题应及时处理。
Partnering管理模式近年来日益受到重视,下列对Partnering的认识中,不恰当的是( )。
一般资料:求助者,女性,29岁,已婚,大学文化程度,某公司职员。案例介绍:求助者是本市人,家中经济条件优越。在工作中与本公司一位同事恋爱,尽管对方比自己小两岁,且家在农村,家中经济条件较差,但还是不顾父母的反对,与之结婚。婚后两人生活得很幸福。然
制定教学策略的首要依据是()。
Time"talks"intheAmericancultureand,forthatmatter,inmanyothercultures.【31】itsaysiscrucialinourrelationswith
IBMannouncedtodayitispullingoutof______.
最新回复
(
0
)