COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Application
|
|
Presentation
|
|
Session
|
|
Internet
|
Detailed explanation-1: -OSI uses three layers–application, presentation and session–to define the functionality of upper layers, while TCP/IP uses only the application layer.
Detailed explanation-2: -The Application layer is the highest layer in the TCP/IP model and is related to the session, presentation and application layers of the OSI model.
Detailed explanation-3: -The layers are: Layer 1-Physical; Layer 2-Data Link; Layer 3-Network; Layer 4-Transport; Layer 5-Session; Layer 6-Presentation; Layer 7-Application.
Detailed explanation-4: -The application layer is the highest abstraction layer of the TCP/IP model that provides the interfaces and protocols needed by the users. It combines the functionalities of the session layer, the presentation layer and the application layer of the OSI model. It facilitates the user to use the services of the network.
Detailed explanation-5: -1. Physical Layer. The Physical Layer is the lowest layer of the TCP/IP model. It deals with data in the form of bits. This layer mainly handles the host to host communication in the network.