位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术中级资格中级资格网络工程师基础知识2022年05月中级网络工程师上午试卷

A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities.  ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

发布时间:2024-07-09

A.two

B.many

C.much

D.ten

试卷相关题目

  • 1A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities.  ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.damaged

    B.descriptive

    C.distributed

    D.demanding

    开始考试点击查看答案
  • 2A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.firewall

    B.router

    C.gateway

    D.switch

    开始考试点击查看答案
  • 3A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. (72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.defense

    B.denial

    C.detection

    D.decision

    开始考试点击查看答案
  • 4A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.

    A.unauthorized

    B.authorized

    C.normal

    D.frequent

    开始考试点击查看答案
  • 5以下关于信息化项目成本估算的描述中,不正确的是(70)。

    A.项目成本估算指设备采购、劳务支出等直接用于项目建设的经费估算

    B.项目成本估算需考虑项目工期要求的影响,工期要求越短成本越高

    C.项目成本估算需考虑项目质量要求的影响,质量要求越高成本越高

    D.项目成本估算过粗或过细都会影响项目成本

    开始考试点击查看答案
返回顶部