Answer:
where is the picture?????
Answer:
Metropolitan Area Network (MAN)
Explanation:
Answer: True?
Explanation:
I’m pretty sure I’m new to that stuff
Answer:
The Session layer (Layer 5)
Explanation:
The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;
i. Layer 1 or the physical layer
ii. Layer 2 or the data-link layer
iii. Layer 3 or the network layer
iv. Layer 4 or the transport layer
v. Layer 5 or the Session layer
vi. Layer 6 or the presentation layer
vii. Layer 7 or the application layer.
Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.
Answer:
Option C is the correct answer for the above question.
Explanation:
Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.
The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-
- Option A states about direct mail which is not a type of attack.
- Option B states about instant messaging which is also not a type of attack.
- Option D states about spam which is used to send the spam messages.
- Option 'E' states about the mass mail which is used to send the lots of spam mail.