首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
31
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(1)
选项
A、message
B、information
C、requests
D、data
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/TgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2010上项管)某企业针对“新一代网络操作系统”开发项目进行可行性论证。在论证的最初阶段,一般情况下不会涉及到______。
(2010上集管)一项新的国家标准出台,某项目经理意识到新标准中的某些规定将导致其目前负责的一个项目必须重新设定一项技术指标,该项目经理首先应该______。
(2005上项管)在距离矢量路由协议中,防止路由循环的技术是______。
(2014上项管)以下关于工作分解结构(WBS)的说法中,______是正确的。
(2010下软评)加密和解密是明文和密文之间的可逆转换,______不属于加密算法。
(2009下架构)公司总部与分部之间需要传输大量数据,在保障数据安全的同时又要兼顾密钥算法效率,最合适的加密算法是______。
(71)________seekstoperformrootcauseinvestigationastowhatisleadingidentifledtrends.
2017年7月8日,《国务院关于印发新一代人工智能发展规划的通知》中提出要建立新一代人工智能关键共性技术体系。新一代人工智能关键共性技术的研发部署要以_____________为核心,以数据和硬件为基础,以提升感知识别、知识计算、认知推理、运动执行、人机交
2017年7月8日,《国务院关于印发新一代人工智能发展规划的通知》中涉及了人工智能的几个基础理论,其中,_____________研究统计学习基础理论、不确定性推理与决策、分布式学习与交互、隐私保护学习等学习理论和高效模型。
随机试题
当今世界,文化越来越成为综合国力竞争的重要因素,成为经济社会发展的重要支撑。我们争夺发展制高点、道义制高点的关键是()
阅读下列短文,回答有关问题。申屠丞相嘉者,梁人,从高帝击项籍,迁为队率。从击黥布军,为都尉。孝文时,嘉迁为御史大夫。张苍免相,孝文帝欲用皇后弟窦广国为丞相,曰:“恐天下以吾私广国。”广国贤有行,故欲相之,念久之不可,而高帝时大臣又皆多死,馀见无可
营养不良患儿皮下脂肪减少的顺序是()
指示提单经过背书可转让,又具有一定保护性,故在国际贸易中广为使用。()
货币乘数也称货币扩张系数,是用以说明货币供给总量与基础货币的倍数关系的一种系数,()被称为狭义的货币乘数。
管理幅度过窄主要的缺点有()。
中国人民银行在______,直接领导下,制定和执行货币政策,防范和化解金融风险,维护金融稳定。
倾向于选择理科的人所具有的认知风格可能是()
某人对某办公软件解密,并制成光盘销售。他应承担的法律责任是()。
Thiswasanunexceptionallybrutalattack.
最新回复
(
0
)