OSI Model and its Layers - 2
Description: OSI Model and Its Layers - 2 | |
Number of Questions: 15 | |
Created by: Preeti Dasgupta | |
Tags: OSI Model and Its Layers - 2 OSI Model and its Layers |
Which of the following application layer protocols can be used for downloading an email from a mailbox server to a user-level mail client?
Fourth-generation firewalls operate up to layer 4 (transport layer) of the OSI model.
Which of the following functions cannot be accomplished by the fourth-generation firewalls?
Fourth generation firewalls operate upto layer 4 (transport layer) of the OSI model.
What is the IP address 255.255.255.255 used for?
What type of protocol is IPv4?
What is the length of the checksum field of IPv4 header?
Which of the following is an error control method for data transmission to achieve reliable data transmission over an unreliable service?
Which of the following protocols can be used for managing networks?
What type of network is ATM?
Why is spanning tree protocol used for bridged ethernet local area network?
Which of the following is not true regarding TCP connections?
Which OSI layer is concerned with the syntax and semantics of the information transmitted?
Which OSI layer connects hosts within the same network?
What is the way of operation of LAN interfaces called, in which all frames are given to the computer,not just those addressed to it?
Which field of the IP header helps to prevent datagrams from persisting on an internet?
Which of the following protocols is used when the delivery protocol encapsulates a different payload protocol?
Users can sometimes sneak through a firewall, using a protocol that the firewall would normally block, but wrapped inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of wrapping, this trick can function to get around the intended firewall policy.