COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
2
|
|
3
|
|
6
|
|
7
|
Detailed explanation-1: -Layer 7 is responsible for the data manipulation and protocols that software needs to present data so it is meaningful to humans. For example, layer 7 protocols include HTTP which enables internet communication and SMTP which enables email communications.
Detailed explanation-2: -HTTP is the predominant Layer 7 protocol for website traffic on the Internet. Layer 7 load balancers route network traffic in a much more sophisticated way than Layer 4 load balancers, particularly applicable to TCP‑based traffic such as HTTP.
Detailed explanation-3: -For example, HTTP is a Layer 7 protocol designed to transmit data between a web server and a client.
Detailed explanation-4: -HTTP is an application-layer protocol that is used for distributed, collaborative, hypermedia information systems. HTTP is the protocol used between web clients and web servers. Many TCP/IP implementations provide an application programming interface to the TCP protocol; that is, to the transport layer.
Detailed explanation-5: -Layer 7, the Application Layer This layer uses following protocols: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and SMPP.