正确答案: B
用来邀请用户参加会话
题目:关于SIP中INVITE消息的描述中,正确的是
解析:INVITE消息用于邀请用户或服务器参加一个会话,服务器可以自动的用OK响应会话邀请。消息的起始行分为请求行或者状态行,其中请求行是请求消息的起始行,状态行是响应消息的起始行。由于INVITE是邀请用户或服务器参加一个会话,因此消息的起始行应该是请求行,并且是由客户端发送。根据分析知,选项B符合题意,故选择B选项。
查看原题 点击获取本科目所有试题
举一反三的答案和解析:
[多选题]访问验证保护级应提供()。
自主访问控制;强制访问控制
审计、数据完整性、隐蔽信道分析
标记、身份鉴别、客体重用
可信路径、可信恢复
解析:答案:ACBD
[单选题]以下哪一个不是风险控制的主要方式
隔离方式
解析:答案:D
[单选题]●IPv6地址33AB:OOOO:OOOO:CD30:0000:0000:0000:0000/60可以表示成各种简写形式,以下写法中,正确的是(58)。
33AB:0:0:
[单选题]● 项目协调的监理方法主要包括 (70) 。①监理会议 ②监理报告 ③沟通 ④评审
①②③
解析:试题(70)分析
[单选题]● 为了提高某化工产品的转化率,选择了反映温度A,反应时间B,用碱量C三个有关因素进行条件试验。三个因素的取值如下:A:A1=80℃,A2=85℃,A3=90℃B:B1=90分钟,B2=120分钟,B3=150分钟C:C1=5%,C2=6%,C3=7%如果利用正交试验设计方法的全面试验法设计测试用例,则需要进行()次测试。()
27
解析:正交试验设计(Orthogonal experimental design)是研究多因素多水平的又一种设计方法,它是根据正交性从全面试验中挑选出部分有代表性的点进行试验,这些有代表性的点具备了“均匀分散,齐整可比”的特点,正交试验设计是分式析因设计的主要方法。是一种高效率、快速、经济的实验设计方法。日本著名的统计学家田口玄一将正交试验选择的水平组合列成表格,称为正交表。例如作一个三因素三水平的实验,按全面实验要求,须进行3^3=27种组合的实验,且尚未考虑每一组合的重复数。若按L9(3)^3正交表按排实验,只需作9次,按L18(3)^7正交表进行18次实验,显然大大减少了工作量。因而正交实验设计在很多领域的研究中已经得到广泛应用。
[单选题]●以下关于定性风险分析的描述中,不正确的是(58)。(58)
实施定性风险分析的方法中包括SWOT分析法.
[单选题]下列选项中,不属于计算机病毒特征的是()。
免疫性
[多选题]There are different ways to perform. IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g.TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE) eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
information
request
date
解析:CBCDB