1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
15

"The OSI model has seven layers and the DoD has four. At which layer does SMTP works in both models"?

Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

Answer: Application layer

Explanation:

In both the OSI model and the DoD model we have the Application layer. The application layer in both the model is at the top layer. SMTP which stands for simple mail transfer protocol is one of the networking protocols used for sending and receiving mails across clients and receiver.

As the application layer is known to support application and protocols which makes it work as an abstraction layer for the network and the host.

So the SMTP being one of the networking protocols works at the application layer of the two most basic and important models.

You might be interested in
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
Dmitry [639]

Answer:

B. How many programming statements the program contains

Explanation:

If a program is intended to be able to process large amounts of data, then the ability of the program to process larger data sets is heavily affected by

  • execution time
  • size of memory the program requires
  • storage space the program requires as it runs.

The length of the statements the program contains does not much affect program performance.

8 0
3 years ago
What types of files are saved with the mp3 and zip extensions
Tanya [424]

Mp3 files are audio files and zip extentions are compressed files so they take up less space

4 0
4 years ago
Different between client server architecture and peer to peer architecture​
Vilka [71]

Answer:

In Client-Server Network, Centralized server is used to store the data.

8 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
A ____ web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to b
Vladimir [108]
Your answer is spoofed.
Thx and take care
7 0
3 years ago
Other questions:
  • When using powershell, an administrator can use the ____________ cmdlet to create a new dc in a new forest.??
    14·1 answer
  • What cell address indicates the intersection of the first row and the first column in a worksheet?
    15·2 answers
  • Describe in detail how to determine if a source is credible when conducting research. Justify your response using two or more co
    8·1 answer
  • Implement function translate() that provides a rudimentary translation service. The function input is a dictionary mapping words
    9·1 answer
  • What else can Xbox do to help reduce negative online behavior? (250 minimum)
    6·1 answer
  • Can anyone help me<br> I will make you a brainalist
    13·1 answer
  • What's a checked exception?
    14·2 answers
  • Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or stand
    8·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
  • patty works at Mcdonald's as a chef. it is her job to make hamburgers as each order arrives on her computer screen. one day patt
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!