小程序
公众号
注册/登录
试题搜索
用看的、听的学真题
study by eyes and ears.
2026中级数据库系统工程师培训报名
2026高级系统分析师培训报名
首页
信息安全工程师
第2章 网络攻击原理与常用方法
真题列表
第2章 网络攻击原理与常用方法
总题数:56题
【62】扫描技术
(62)
。
真题详情及解析
【11】拒绝服务攻击是指攻击者利用系统的缺陷,执行一些恶意的操作,使得合法的系统用户不能及时得到应得的服务或系统资源。常见的拒绝服务攻击有同步包风暴、UDP洪水、垃圾邮件、泪滴攻击、Smurf攻击、分布式拒绝服务攻击等类型。其中,能够通过在IP数据包中加入过多或不必要的偏移量字段,使计算机系统重组错乱的是
(11)
。
真题详情及解析
【12】拒绝服务攻击是指攻击者利用系统的缺陷,执行一些恶意的操作,使得合法的系统用户不能及时得到应得的服务或系统资源。以下给出的攻击方式中,
不属于
拒绝服务攻击的是
(12)
。
真题详情及解析
【67】
(67)
攻击是指借助于客户机/服务器技术,将多个计算机联合起来作为攻击平台,对一个或多个目标发动DoS攻击,从而成倍地提高拒绝服务攻击的威力。
真题详情及解析
【21】
(21)
是一种通过不断对网络服务系统进行干扰,影响其正常的作业流程,使系统响应减慢甚至瘫痪的攻击方式。
真题详情及解析
【71-75】There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(71)
(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other
(72)
, the attacker inserts a large amount of
(73)
packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an
(74)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover,the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(75)
the net work.
真题详情及解析
【21】有一种攻击是不断对网络服务系统进行干扰,改变其正常的作业流程,执行无关程序使系统响应减慢甚至瘫痪,这种攻击叫做
(21)
。
真题详情及解析
【10】通过假冒可信方提供网上服务,以欺骗手段获取敏感个人信息的攻击方式,被称为
(10)
。
真题详情及解析
【57】以下关于网络钓鱼的说法中,
不正确
的是
(57)
。
真题详情及解析
【11】下列攻击中,
不能
导致网络瘫痪的是
(11)
。
真题详情及解析
首页
上一页
1
2
3
4
5
6
下一页
末页
培训报名