Match the OSI layer with its name
I. Layer 2 A. Application
II. Layer 4 B. Session
III. Layer 5 C. Data Link
IV. Layer 7 D. Transport
C D B A
Computer Science & Information Technology
You might also like to view...
Which of the following BEST describes the primary role of a risk assessment as it relates to compliance with risk-based frameworks?
A. It demonstrates the organization's mitigation of risks associated with internal threats. B. It serves as the basis for control selection. C. It prescribes technical control requirements D. It is an input to the business impact assessment
Computer Science & Information Technology
When should an operation contract be written?
a. during analysis b. after coding c. at the same time as user documentation d. when taking initial notes from client
Computer Science & Information Technology