At what layer of the OSI model does a network switch normally operate?

a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5


ANSWER: a

Computer Science & Information Technology

You might also like to view...

Which of the following developmental policies can help an IT department address secure programming issues?

A) All code must be checked for back doors and Trojan horses. B) All buffers must have error handling to prevent buffer overruns. C) All communication must adhere to an organization's secure communications guidelines. D) All of the above

Computer Science & Information Technology

When creating a database, a(n) ____ is represented as a table.

A. entity B. attribute C. determinant D. tuple

Computer Science & Information Technology

What are the minimum functions supported by all network monitoring tools??

What will be an ideal response?

Computer Science & Information Technology

The Information Technology department is a modern name for the Data Processing department.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology