首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
37
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(1)
选项
A、message
B、information
C、requests
D、data
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/TgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2010上项管)某企业针对“新一代网络操作系统”开发项目进行可行性论证。在论证的最初阶段,一般情况下不会涉及到______。
(2007下项管)商业智能(BI)的核心技术是逐渐成熟的数据仓库(DW)和______。
(2013上集管)配置项的版本控制作用于多个配置管理活动之中,如创建配置项,配置项的变更和配置项的评审等。下面关于配置项的版本控制的描述中,______是正确的。
(2008上网工)ARP协议的作用是由IP地址求MAC地址,ARP请求是广播发送,ARP响应是______发送。
(2014下集管)“十二五”期间,电子政务促进行政体制改革和服务型政府建设的作用更加显著,其发展目标不包括______。
(2007上网工)关于多模光纤,下面的描述中描述错误的是______。
(2005下软设)代码走查(codewalkthrough)和代码审查(codeinspection)是两种不同的代码评审方法,这两种方法的主要区别是______。
(2009下软设)一个项目为了修正一个错误而进行了变更,但这个错误被修正后,却引起以前可以正确运行的代码出错。______最可能发现这一问题。
软件复用是使用已有的软件产品(如设计、代码、文档等)来开发新的软件系统的过程。软件复用的形式大体可分为垂直式复用和水平式复用。垂直式复用是指(46)中的复用,水平式复用是指(47)中的复用。为了提高构件的复用率,通常要求构件具有较好的(48)。为了将不同软
Performing(49)involvesmonitoringspecificprojectresultstodetermineiftheycomplywithrelevantqualitystandardsandident
随机试题
试述决策过程的民主化包含的内容。
简述我国传统的饮食文化观念。
患者,女,30岁。白带增多伴阴道瘙痒3天。体格检查:阴道壁充血明显,表面覆有较多大量豆腐渣样分泌物,宫颈口见少量浆液性分泌物。该患者诊断首先考虑
为详细核算一般纳税人应缴纳增值税的计算、解缴和抵扣等情况,下列各项中属于企业应在“应交增值税”明细科目下设置的专栏有()。
企业在确定能否对被投资单位实施控制或施加重大影响时,应当考虑投资企业持有的被投资单位可转换公司债券、可执行认股权证等潜在表决权因素。()
局域网是一种在小区域内使用的网络,其英文缩写为______。
学生出现教师期待的行为后,教师发给小红星,学生可用小红星兑换奖励物或喜欢的活动。教师采用的方法是()。
试比较单道与多道批处理系统的特点及优缺点。
求f(x)=(x-2)e-x展为x-1的幂级数,并指出其收敛域.
A.WhatisZYBAN?B.WhatarethesideeffectsoftakingZYBAN?.C.WhoinventedZYBAN?D.HowlongshouldItakeZYBAN?E.Ho
最新回复
(
0
)