Which of the following is not a layer of the Open Systems Interconnect (OSI) reference model?

A) Physical layer
B) Data link layer
C) Internet access layer
D) Presentation layer


C

Computer Science & Information Technology

You might also like to view...

What is the main drawback of password-protecting your notebook?

A) Someone changing your password B) Someone else accessing your information C) Giving out your password D) Forgetting your password

Computer Science & Information Technology

To set monitoring options in the Windows Defender window, click or tap the ____ tab.

A. History B. Record C. Monitoring D. Control

Computer Science & Information Technology

In the B-tree deletion logic, the immediate predecessor is the ____ of the entry to be deleted.

A. largest node on the left subtree B. smallest node on the left subtree C. largest node on the right subtree D. smallest node on the right subtree

Computer Science & Information Technology

A security manager is discussing change in the security posture of the network, if a proposed application is approved for deployment. Which of the following is the MOST important the security manager must rely upon to help make this determination?

A. Ports used by new application B. Protocols/services used by new application C. Approved configuration items D. Current baseline configuration

Computer Science & Information Technology