The four layers of the TCP/IP stack (also called the DoD model) are Application/process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
Routers operate at layer 3. LAN switches operate at layer 2. Ethernet hubs operate at layer 1. Word processing applications communicate to the Application layer interface, but do not operate at layer 7, so the answer would be none.
when trying to find the best answer to an access - list question, always check the access - list bnumber and then the protocol. When filtering to an upper - layer protocol, you must use an extended list, numbers 100 - 199 and 2000 - 2699. Also, when you filter to the port of an upper - layer protocol, you must use either tcp or udp in the ACL protocol field. If it says ip in the protocol field, you cannot filoter on the port number of an upper - layer protocol. SMTP uses TCP
IPSec is an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer3 Network layer of the OSI model.
By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.
Flow control allows the receiving device to control the transmitter so the receiving device's buffer does not overflow.
Comments
There are no comments.Copyright ©CuriousTab. All rights reserved.