
【名词&注释】
高效率(high efficiency)、实验设计(experimental design)、转化率(conversion)、代表性(representative)、广泛应用、完整性(integrity)、计算机病毒(computer virus)、技术含量(technical content)、破坏性(destructive)、化工产品(chemical products)
[单选题]关于SIP中INVITE消息的描述中,正确的是
A. 由服务器发送
B. 用来邀请用户参加会话
C. 代理服务器自动用ACK响应
D. 消息的起始行是状态行
查看答案&解析
举一反三:
[多选题]访问验证保护级应提供()。
A. 自主访问控制;强制访问控制
B. 审计、数据完整性、隐蔽信道分析
C. 标记、身份鉴别、客体重用
D. 可信路径、可信恢复
[单选题]以下哪一个不是风险控制的主要方式
A. 规避方式
B. 转移方式
C. 降低方式
D. 隔离方式
[单选题]●IPv6地址33AB:OOOO:OOOO:CD30:0000:0000:0000:0000/60可以表示成各种简写形式,以下写法中,正确的是(58)。
A. 33AB:0:0:
B. C
C. D30::/60
D. 33AB:0:0:CD3/60
[单选题]● 项目协调的监理方法主要包括 (70) 。①监理会议 ②监理报告 ③沟通 ④评审
A. (70)
B. ①②
C. ①②④
D. ①②③
E. ①②③④
[单选题]● 为了提高某化工产品(chemical products)的转化率,选择了反映温度A,反应时间B,用碱量C三个有关因素进行条件试验。三个因素的取值如下:A:A1=80℃,A2=85℃,A3=90℃B:B1=90分钟,B2=120分钟,B3=150分钟C:C1=5%,C2=6%,C3=7%如果利用正交试验设计方法的全面试验法设计测试用例,则需要进行()次测试。()
A. 9
B. 18
C. 27
D. 32
[单选题]●以下关于定性风险分析的描述中,不正确的是(58)。(58)
A. 定性风险分析需要考虑风险发生的概率及其后果的影响性
B. 实施定性风险分析的方法中包括SWOT分析法.
C. 通常情况下,技术含量(technical content)越高的项目,其风险程度也越高
D. 定性风险分析的工作成果之一是按优先级形成风险总排队
[单选题]下列选项中,不属于计算机病毒(computer virus)特征的是()。
A. 破坏性(destructive)
B. 潜伏性
C. 免疫性
D. 传染性
[多选题]There are different ways to perform. IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g.TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE) eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
A. message
B. information
C. request
D. date
E. methods B.cases C.hands D.sections
本文链接:https://www.zhukaozhuanjia.com/download/64r3k0.html