319. Which of the following ISO/OSI layers does
a. Presentation layer
b. Transport layer
c. Network layer
d. Session layer
The presentation layer is incorrect because it provides authentication and confidentiality services. It defines and transforms the format of data to make it useful to the receiving application. It provides a common means of representing a data structure in transit from one end system to another.
The transport layer is incorrect because it provides confidentiality, authentication, data integrity, and access control services. It ensures an error-free, in-sequence exchange of data between end points. It is responsible for transmitting a message between one network user and another.
The network layer is incorrect because it provides confidentiality, authentication, data integrity, and access control services. It is responsible for transmitting a message from its source to the destination. It provides routing (path control) services to establish connections across communications networks.
320. User datagram protocol (UDP) is a part of which of the following TCP/IP layers?
a. Applications layer
b. Transport layer
c. Network layer
d. Data link layer
The application layer is incorrect because it sends and receives data for particular applications. The network layer is incorrect because it routes packets across networks. The data link layer is incorrect because it handles communications on the physical network components.
321. Internet control message protocol (ICMP) is a part of which of the following TCP/IP layers?
a. Applications layer
b. Transport layer
c. Network layer
d. Data link layer
The application layer is incorrect because it sends and receives data for particular applications. The transport layer is incorrect because it provides connection-oriented or connectionless services for transporting application layer services between networks. The data link layer is incorrect because it handles communications on the physical network components.
322. Which of the following
a. Web proxy servers
b. Routers
c. Nonproxying firewalls
d. Web browsers
Routers, nonproxying firewalls, and other network devices might log the basic aspects of HTTP network connections, such as source and destination IP addresses and ports.