Govt. Exams
Entrance Exams
Layer 2 (Data Link Layer) operates with MAC addresses and frames. IP addresses (Layer 3) and application data (Layer 7) would not be directly visible at Layer 2 without further analysis.
The Session Layer (Layer 5) manages dialogues between applications, handling session establishment, maintenance, synchronization, and termination.
Raw bit transmission over physical media (twisted pair cables) involves Layer 1 (Physical Layer). Data Link Layer (Layer 2) protocols handle the framing and transmission rules for these bits.
TCP provides reliable, ordered delivery with error checking; UDP prioritizes speed with minimal overhead. Choice of protocol depends on application requirements.
The Presentation Layer (Layer 6) is responsible for data encryption, decryption, compression, and translation, making it the appropriate layer for implementing encryption services.
The TCP/IP model's Application Layer combines the functionality of OSI Layers 5 (Session), 6 (Presentation), and 7 (Application).
HTTP is an Application Layer (Layer 7) protocol. To intercept and modify HTTP traffic, an attacker must operate at Layer 7 where the actual content is accessible.
A gateway typically operates at Layer 3 (routing) and Layer 4 (protocol conversion), and may involve Layer 7 for application-level filtering. Issues at the gateway level suggest Layer 3-4 problems.
HTTPS (web browsing) is an Application Layer protocol. A, C, and D belong to Presentation, Network, and Physical layers respectively.
The Data Link Layer (Layer 2) uses CRC (Cyclic Redundancy Check) to detect frame errors and corruption in the frame header.