Which of the following layers of the OSI model controls the data flow and troubleshoots any problems with transmitting or receiving datagrams?
A) Session
B) Transport
C) Application
D) Presentation
B) Transport
The Transport layer controls the data flow and troubleshoots any problems with transmitting or receiving datagrams. It consists of both connection-oriented and connection-less protocols providing communications between devices on a computer network. Packet filtering routers, multi-layer switches, and firewalls work at this layer.
The Session layer establishes and controls data communication between applications operating on two different computers, regulating when each computer can send data and how much it can send.
You might also like to view...
__________ depend on the running time of the decryption algorithm.
A. Mathematical attacks B. Timing attacks C. Chosen ciphertext attacks D. Brute-force attacks
If a device does not receive an IP address from a DHCP server, the device may resort to what kind of IP address?
A. APIPA B. random IP address C. public IP address D. dynamic IP address
Which algorithm was the first asymmetric, or public-key, encryption algorithm developed (in 1977) and published for commercial use?
A. MAC B. RSA C. DES D. AES
The Resource Usage view shows you all of the following for each resource EXCEPT ____.
A. baseline cost B. variance C. key cost D. remaining cost