位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格中级资格网络工程师基础知识2022年05月中级网络工程师上午试卷

A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities.  ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

发布时间:2024-07-09

A.damaged

B.descriptive

C.distributed

D.demanding

试卷相关题目

  • 1A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.firewall

    B.router

    C.gateway

    D.switch

    开始考试点击查看答案
  • 2A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. (72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.defense

    B.denial

    C.detection

    D.decision

    开始考试点击查看答案
  • 3A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.unauthorized

    B.authorized

    C.normal

    D.frequent

    开始考试点击查看答案
  • 4以下关于信息化项目成本估算的描述中,不正确的是(70)。

    A.项目成本估算指设备采购、劳务支出等直接用于项目建设的经费估算

    B.项目成本估算需考虑项目工期要求的影响,工期要求越短成本越高

    C.项目成本估算需考虑项目质量要求的影响,质量要求越高成本越高

    D.项目成本估算过粗或过细都会影响项目成本

    开始考试点击查看答案
  • 5《中华人民共和国数据安全法》由中华人民共和国第十三届全国人民代表大会常务委员会第二十九次会 议审议通过,自(69)年9月1日起施行。

    A.2019

    B.2020

    C.2021

    D.2022

    开始考试点击查看答案
  • 6A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities.  ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.two

    B.many

    C.much

    D.ten

    开始考试点击查看答案
返回顶部