At which layer of the OSI model do MAC addresses operate?

A. Data Link
B. Network
C. Application
D. Physical

Ans: A. Data Link

Computer Science & Information Technology

You might also like to view...

To access the ________ window, click the Debug button within the Microsoft Visual Basic dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

What specific type of DNS attack uses public DNS servers to overwhelm a target with DNS responses by sending DNS queries with spoofed IP addresses ?

A. DNS amplification attack B. DNS proxy attack C. DNS service attack D. DNS IP spoofing

Computer Science & Information Technology