Question

. Name the layer of the Web/Internet Protocol Stack with which each of these functions is...

. Name the layer of the Web/Internet Protocol Stack with which each of these functions is associated.

a. Encrypt a message.

b. Prevent buffer overruns.

c. Choose the best route for a data packet.

d. Compose an email message.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In TCP/IP model
a. Encrypt a message- Application later
b. Prevent buffer overruns-Transport layer
c. Choose the best route for a data packet-Internet layer
d. Compose an email message-Application layer

In ISO/OSI model
a. Encrypt a message- Presentation later
b. Prevent buffer overruns-Session layer
c. Choose the best route for a data packet-Network layer
d. Compose an email message-Application layer

Add a comment
Know the answer?
Add Answer to:
. Name the layer of the Web/Internet Protocol Stack with which each of these functions is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • those are the options for each D Question 8 Match the Internet Protocol Stack layer with...

    those are the options for each D Question 8 Match the Internet Protocol Stack layer with its respective encapsulation header/trailer. Application Layer I Choose Transport Layer Datagram Message Choose Choose] Link Layer . Previous

  • A protocol defines which of the following? Format of a message. Order of messages sent and...

    A protocol defines which of the following? Format of a message. Order of messages sent and received. Actions taken on transmission and/or receipt of a message. All of the above are true. Which of the following is unguided physical media? Coaxial Cable Fiber-optic Cable Radio Waves Twisted-pair Copper Two fundamental approaches to moving data through a network of links and switches are circuit switching and __________ switching. data information packet signal The traditional telephone network is an example of a...

  • Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50...

    Subject. Internet & web design technology I need the questions number. 27, 28, 29,30,35,,37,39 , 40,43,45,49,50 Please send me the correct answer The last page have 43,45,49,50 We were unable to transcribe this imageprotocol (32) t an application attempts to send a UDP do? message that exceeds the Maximum Transmission Unit (MTU), what will the Ip d) compress it le) expand MTU (b) truncate it (c) fragment n (a) reject it (33] Which is not true of the Transmission Controil...

  • 1._______ is used for supervisory messages at the Internet Protocol layer. A)TCP B)DNS C)DHCP D)ICMP 2.In...

    1._______ is used for supervisory messages at the Internet Protocol layer. A)TCP B)DNS C)DHCP D)ICMP 2.In the Domain Name System, there is/are ______ root server(s), which is/are the highest level server(s). A)no B)one C)more than one D)none of the above 3.Which of the following is likely to dominate in VoIP as signaling protocol? A)SIP. B)H.323. C)IP D)Both A and B 4.Which of the following offers more reliable antivirus protection? A)Antivirus software on user PCs. B)Antivirus software on the mail server....

  • Which of the following is an incorrect statement? A. http is a stateless protocol B. http...

    Which of the following is an incorrect statement? A. http is a stateless protocol B. http is a request respond protocol C. http server is the same as web server D. http server deals with the functions of 4 layers from OSI reference model; application layer, session layer, presentation layer, and network layer

  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • LTE Data Link Homework. Unanswered Match the LTE Data Link layer protocol with its description Drag...

    LTE Data Link Homework. Unanswered Match the LTE Data Link layer protocol with its description Drag and drop options on the right-hand side and submit. For keyboard navigation... Show More Packet Data Convergence fragmentation and reassembly, reliable data transfer Radio Link Control III use of radio transmission slots Medium Access III mobility management III header compression and encryption III authentication services Unanswered Submit Multiple Correspondents Homework. Unanswered Which issues effect multiple concurrent correspondents Select an answer and submit. For keyboard...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • In C++ Task 3: Use the stack and queue to simulate receiving and transforming data We are creating a system that will co...

    In C++ Task 3: Use the stack and queue to simulate receiving and transforming data We are creating a system that will convert strings sent over a serial bus one character at a time. The conversion will be from big to little endian or from little to big endian. To simplify this, each character will be considered a word. Little endian will have the lowest address first. Big endian will have the biggest address first. For example (for this lab),...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT