At what layer of the OSI model does a network switch normally operate?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
ANSWER: a
You might also like to view...
Which of the following developmental policies can help an IT department address secure programming issues?
A) All code must be checked for back doors and Trojan horses. B) All buffers must have error handling to prevent buffer overruns. C) All communication must adhere to an organization's secure communications guidelines. D) All of the above
When creating a database, a(n) ____ is represented as a table.
A. entity B. attribute C. determinant D. tuple
What are the minimum functions supported by all network monitoring tools??
What will be an ideal response?
The Information Technology department is a modern name for the Data Processing department.
Answer the following statement true (T) or false (F)