A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.unauthorized
B.authorized
C.normal
D.frequent
试卷相关题目
- 1以下关于信息化项目成本估算的描述中,不正确的是(70)。
A.项目成本估算指设备采购、劳务支出等直接用于项目建设的经费估算
B.项目成本估算需考虑项目工期要求的影响,工期要求越短成本越高
C.项目成本估算需考虑项目质量要求的影响,质量要求越高成本越高
D.项目成本估算过粗或过细都会影响项目成本
开始考试点击查看答案 - 2《中华人民共和国数据安全法》由中华人民共和国第十三届全国人民代表大会常务委员会第二十九次会 议审议通过,自(69)年9月1日起施行。
A.2019
B.2020
C.2021
D.2022
开始考试点击查看答案 - 3某存储系统规划配置25块8TB磁盘,创建2个RAID6组,配置1块热备盘,则该存储系统实际存储容 量是(68)。
A.200TB
B.192TB
C.176TB
D.160TB
开始考试点击查看答案 - 4以下关于层次化网络设计模型的描述中,不正确的是(67)。
A.终端用户网关通常部署在核心层,实现不同区域间的数据高速转发
B.流量负载和VLAN间路由在汇聚层实现
C.MAC地址过滤、路由发现在接入层实现
D.接入层连接无线AP等终端设备
开始考试点击查看答案 - 5某无线路由器,在2.4GH频道上配置了 2个信道,使用(66)信道间干扰最小。
A.1 和 3
B.4 和 7
C.6 和 10
D.7 和 12
开始考试点击查看答案 - 6A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. (72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.defense
B.denial
C.detection
D.decision
开始考试点击查看答案 - 7A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.firewall
B.router
C.gateway
D.switch
开始考试点击查看答案 - 8A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.damaged
B.descriptive
C.distributed
D.demanding
开始考试点击查看答案 - 9A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.two
B.many
C.much
D.ten
开始考试点击查看答案
最新试卷
注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2013
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2013
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2013
类别:建筑类其它