首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
30
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(3)
选项
A、bad
B、real
C、fake
D、new
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/FgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2011上项管)以下关于企业战略说法中,不正确的是______。
(2005上软评)下列关于软件开发的叙述中,与提高软件可移植性相关的是______。
(2006上系分)在关于数据挖掘的描述,正确的是______。
(2011上项管)某项目计划分为立项、实施和运维三个阶段。财务部给该项目的预算金额不超过80万元。项目经理估算立项阶段的成本为20万元,实施阶段的成本为50万元,运维阶段的成本为30万元。若用自底向上法对该项目的成本进行估算,则估算值应为______万元。
(2007上监理)对于ISO9000族标准,我国国标目前采用的方式是______。
(2005下监理)ISO9000质量管理体系认证书的有效期为______。
(2014下集管)“十二五”期间,电子政务促进行政体制改革和服务型政府建设的作用更加显著,其发展目标不包括______。
(2012上项管)下面属于项目范围控制活动的是______。
(2010下软评)加密和解密是明文和密文之间的可逆转换,______不属于加密算法。
某信息化项目到2017年12月31日的成本执行(精效)数据见下表。选项表述不正确的是()。
随机试题
在我国新闻单位领导体制的基本类型中,体现了编辑业务和经营管理业务相分离的是()
下列哪种疾病可引起中性粒细胞减少
输血所致的并发症中,最严重的是【】
乙级标准智能建筑应建立传输速率不小于10Mbit/s的计算机主干网络系统。()
背景材料:某高速公路隧道为双线分离式隧道,左线起讫桩号为ZK9+680~ZKl0+303,全长623m,右线起讫桩号为YK9+683~YKl0+305,全长622m。隧道净空宽度为10m,净空高度为6.49m,该隧道右线(地质)纵断面图如下图所示。图中水
以下不属于现金类资产的是()。
西方经济学关于利率决定因素的观点有()。
速食食品包括()
设计美术馆向来是建筑师莫大的机遇,他们会因此得到可以尽情施展最炫目华彩技法的舞台。而在梵.高美术馆,从最初设计草图的里特维尔德,到负责设计配楼的黑川纪章,再加上为他们拾遗补缺的凡.古尔,都不约而同地采取了非常低调内敛的姿态,绝无半分喧宾夺主的企图。是不是该
A、Undertheseats.B、Behindthedoor.C、Onthefloor.D、Ladies’room.DWhichplacedothievesstealpursesintheaters?
最新回复
(
0
)