Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session hijacking attacks?

a. Application
b. Presentation
c. Session
d. Network


ANS: C

Computer Science & Information Technology

You might also like to view...

From the user’s point of view, plug-and-play devices that are added to the system typically are ready to use ________.

a) after restarting the computer b) after manually configuring the operating system to identify the device c) immediately, with little or no user interaction d) after logging off and logging back onto the system

Computer Science & Information Technology

A(n) ________ is a navigation element that, when clicked, will take you to another location, such as a webpage or a document

A) browser B) URL C) hyperlink D) email address

Computer Science & Information Technology

Which image file type is the best for photographs?

a. Vector b. Encapsulated PostScript c. Bitmap d. Shockwave e. Laser

Computer Science & Information Technology

Following are the ages of students in a math class at a local community college. 18, 18, 19, 19, 19, 20, 20, 22, 22, 22, 23, 23, 25, 27, 42, 43, 57 Construct a graph that is appropriate for these data. Discuss the "spread" of this graph as it pertains to the average age of a student in the class.

What will be an ideal response?

Computer Science & Information Technology