Match the OSI layer with its name

I. Layer 2 A. Application
II. Layer 4 B. Session
III. Layer 5 C. Data Link
IV. Layer 7 D. Transport

C D B A

Computer Science & Information Technology

You might also like to view...

Which of the following BEST describes the primary role of a risk assessment as it relates to compliance with risk-based frameworks?

A. It demonstrates the organization's mitigation of risks associated with internal threats. B. It serves as the basis for control selection. C. It prescribes technical control requirements D. It is an input to the business impact assessment

Computer Science & Information Technology

When should an operation contract be written?

a. during analysis b. after coding c. at the same time as user documentation d. when taking initial notes from client

Computer Science & Information Technology