欢迎访问第一题库!

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is tha

第一题库 分享 时间: 加入收藏

考试:高级软件水平考试

科目:(高级)网络规划设计师(在线考试)

问题:

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment?( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other?(请作答此空), the attacker inserts a large amount of?( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an?( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device( )the network.
A:methods
B:cases
C:hands
D:sections

答案:


解析:


相关标签:

(高级)网络规划设计师     based     DoS     different     设计师     Attacks    

推荐文章

在进行项目干系人分析时,经常用到权力/利益分析法,( )属于第二区域的项目干系人 。 某项目主要由A~I任务构成,其计划图(如下图所示)展示了各任务之间的前后关系以及每个任务的工期(单位:天),该项目的关键路径是B→E→G→I。在不延误项目总工期的情况下,任务A最多可以推迟开始的时间是 编号1、2、3、4、5、6的6个城市的距离矩阵如下表所示。设推销员从1城出发,经过每个城市一次且仅一次,最后回到1城,选择适当的路线,推销员最短的行程是( )公里。 挣值管理是一种综合了范围、时间、成本绩效测量的方法,通过与计划完成的工作量、实际挣得的收益、实际的成本进行比较,可以确定成本进度是否按计划执行。下图中标号所标示的区间依次应填写 ( ) 。 现有某营养麦片的食品标签,标注有以下主要内容:营养麦片富含9种维生素、6种矿物质、富含膳食纤维。GI值为45。更低糖分。丰富钙质及帮助钙质吸收的维生素D3。配料:全小麦粉、大米、大麦麦芽精、白砂糖、玉 试题一(共20分)阅读以下说明,回答问题1至问题3,将解答填入答题纸对应的解答栏内。【说明】某单位有两间办公室,通过ADSL接入Internet,内网由若干台计算机组成局域网,手机和笔记本电脑均可通过 题目请看图片 某Excel成绩表如下所示,若在G13单元格中输入(),则G13单元格为平均成绩不及格的学生数。假设学生平均成绩分为优秀(平均成绩≥85)、及格(60≤平均成绩<85)和不及格(平均成绩<60)三个等 假设段页式存储管理系统中的地址结构如下图所示,则系统中( )。 TCP会话通过( )次握手来建立连接。其中第一次握手:源主机发送一个同步标志位SYN=( )的TCP数据段。源主机进入( )状态。第二次握手:目标主机接收到SYN包后发回确认数据报文。该数据报文ACK
221381
领取福利

微信扫码领取福利

微信扫码分享