Which layer of the OSI model manages connecting applications to applications?

A. Application
B. Session
C. Data Link
D. Transport


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following elements ensures a policy is enforceable?

A) Compliance can be measured. B) Appropriate sanctions are applied when the policy is violated. C) Appropriate administrative, technical, and physical controls are put in place to support the policy. D) All of the above

Computer Science & Information Technology

A(n) line chart is used to show the proportions of parts to a whole.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Although you can insert content controls in an unformatted document, you should consider placing them in a multi-column section wherever possible

Indicate whether the statement is true or false

Computer Science & Information Technology

Jane, a security administrator, recently configured the firewall for the corporate office. Some users report that they are unable to access any resources outside of the company. Which of the following is the MOST likely reason for the lack of access?

A. Jane forgot to save the configuration on the firewall B. Jane forgot to account for the implicit deny statement C. Jane forgot to connect the internal firewall port back to the switch D. Jane specifically denied access for all users

Computer Science & Information Technology