欢迎访问第一题库!

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is tha

第一题库 分享 时间: 加入收藏

考试:高级软件水平考试

科目:(高级)网络规划设计师(在线考试)

问题:

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other( ), the attacker inserts a large amount of( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(请作答此空)the network.
A:or
B:of
C:in
D: to

答案:


解析:


相关标签:

(高级)网络规划设计师     based     DoS     different     设计师     Attacks    

热门排序

推荐文章

如图所示,Switch A通过Switch B和NMS跨网段相连并正常通信。SwitchA 与Switch B配置相似,从给出的Switch A的配置文件可知该配置实现的是,验证配置结果的命令是( J2EE平台采用了多层分布式应用程序模型,实现不同逻辑功能的应用程序被封装到不同的构件中,处于不同层次的构件可被分别部署到不同的机器中。图中的1-5分别为 进程Pl、P2、P3、P4、P5和P6的前趋图如下图所示:若用PV操作控制这6个进程的同步与互斥的程序如下,那么程序中的空①和空②处应分别为( );空③和空④处应分别为( );空⑤和空⑥处应分别为(请 IEEE 802.11a工作在全球通用的( )ISM频段,最高数据速率可达( )。 Windows7环境下,在命令行状态下执行( )命令,可得到下图所示的输出结果,输出结果中的(46)项,说明SNMP服务已经启动,对应端口已经开启。 某单位体检发现,在参加体检的347名办公室工作人员中(男性163名),2007年男性肥胖者50名,女性37名,这些员工在2008年体检仍为肥胖,但2008年体检中,男性肥胖者又增加了12人,女性增加了 阅读下列说明,回答问题1至问题3,将解答填入的对应栏内。[说明]场景法是黑盒测试中重要的测试用例设计方法。目前多数软件系统都是用事件触发来控制业务流程,事件触发时的情景便形成了场景,场景的不同触发顺序 按照云计算服务提供的资源层次,可以分为( )、PaaS和SaaS三种服务类型。 试题(15 分)阅读以下说明和流程图,填补流程图中的空缺,将解答填入答题纸的对应栏 内。【说明】设有整数数组 A[1:N](N>1),其元素有正有负。下面的流程图在该数组 中寻找连续排列的若干个元素, 已知栈S初始为空,用I表示入栈、O表示出栈,若入栈序列为a1a2a3a4a5,则通过栈S得到出栈序列a2a4a5a3a1的合法操作序列( )
221381
领取福利

微信扫码领取福利

微信扫码分享