In which of the following layers of the OSI model does the TCP protocol operate?
A) Session
B) Transport
C) Network
D) Data Link
Answer: B) Transport
Computer Science & Information Technology
You might also like to view...
________ floods a computer with requests until it shuts down denying access to legitimate users
A) An encryption virus B) A DoS attack C) A polymorphic virus D) Port blocking
Computer Science & Information Technology
Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?
A. Logical connection B. Congestion C. Retransmission D. Windowing
Computer Science & Information Technology