In which of the following layers of the OSI model does the TCP protocol operate?

A) Session
B) Transport
C) Network
D) Data Link

Answer: B) Transport

Computer Science & Information Technology

You might also like to view...

________ floods a computer with requests until it shuts down denying access to legitimate users

A) An encryption virus B) A DoS attack C) A polymorphic virus D) Port blocking

Computer Science & Information Technology

Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?

A. Logical connection B. Congestion C. Retransmission D. Windowing

Computer Science & Information Technology