At which layer of the OSI model do MAC addresses operate?
A. Data Link
B. Network
C. Application
D. Physical
Ans: A. Data Link
Computer Science & Information Technology
You might also like to view...
To access the ________ window, click the Debug button within the Microsoft Visual Basic dialog box
Fill in the blank(s) with correct word
Computer Science & Information Technology
What specific type of DNS attack uses public DNS servers to overwhelm a target with DNS responses by sending DNS queries with spoofed IP addresses ?
A. DNS amplification attack B. DNS proxy attack C. DNS service attack D. DNS IP spoofing
Computer Science & Information Technology