搜题集 >职业资格类 >软考 >试题详情
问题详情

下列哪项不属于完整的故障记录()
A.故障编号
B.故障类别
C.记录故障的日期和时间
D.有无故障

未搜索到的试题可在搜索页快速提交,您可在会员中心"提交的题"快速查看答案。 收藏该题
查看答案

相关问题推荐

窃取是对(41)的攻击,DDos攻击破坏了(42)。
A.可用性
B.保密性
C.完整性
D.真实性
以下选项中,不属于生物识别中的表明行为特征方法的是()。
A.签名
B.行走步态
C.脸型
D.语音
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment(本题)(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other(72),the attacker inserts a large amount of(73)packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,an(74)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network element.For instance,a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(75)the network.
A.message
B.information
C.requests
D.date
人为的安全威胁包括主动攻击和被动攻击,以下属于主动攻击的是()。
A.后门
B.流量分析
C.信息窃取
D.数据窥探
网络故障恢复措施有哪些()①双主干②开关控制技术③路由器④通信中件
A.①②③④
B.①②③
C.①③
D.②④
联系客服 会员中心
TOP