Which of the ISO/OSI model layers provides for routing
packets between nodes?
A. Data link
B. Network
C. Transport
D. Session
Answer / guest
Answer: B
The network layer switches and routes information (network
layer header). Node-to-node data link services are extended
across a network by this layer. The network layer provides
service for routing packets (units of information at the
network layer) between nodes connected through an arbitrary
network. The data link layer transmits information as
groups-of-bits (logical units called a frame) to adjacent
computer systems (node-to-node). The bits in a frame are
divided into an address field (media access control MAC 48
bit hardware address), control field, data field and error
control field. The transport layer, provides end-to-end data
integrity. To ensure reliable delivery, the transport layer
builds on the error control mechanisms provided by lower
layers. If lower layers do not do an adequate job, the
transport layer is the last chance for error recovery. The
session layer provides the control structure for
communications between applications. It establishes, manages
and terminates connections (sessions) between cooperating
applications and performs access security checking.
| Is This Answer Correct ? | 5 Yes | 0 No |
The planning and monitoring of computer resources to ensure that they are being used efficiently and effectively is: A. hardware monitoring. B. capacity management. C. network management. D. job scheduling.
Which of the following choices BEST ensures the effectiveness of controls related to interest calculation inside an accounting system? A. Re-performance B. Process walk-through C. Observation D. Documentation review
Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data? A. Inheritance B. Dynamic warehousing C. Encapsulation D. Polymorphism
Which of the following describes a difference between unit testing and system testing? A. Unit testing is more comprehensive. B. Programmers are not involved in system testing. C. System testing relates to interfaces between programs. D. System testing proves user requirements are complete.
A company performs full backup of data and programs on a regular basis. The primary purpose of this practice is to: A. maintain data integrity in the applications. B. restore application processing after a disruption. C. prevent unauthorized changes to programs and data. D. ensure recovery of data processing in case of a disaster.
An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the: A. EDI trading partner agreements. B. physical controls for terminals. C. authentication techniques for sending and receiving messages. D. program change control procedures.
During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.
Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings
Which of the following would be the LEAST important aspect of a business continuity plan? A. Redundant facilities B. Relocation procedures C. Adequate insurance coverage D. Current and available business continuity manual
Which of the following functions, if performed by scheduling and operations personnel, would be in conflict with a policy requiring a proper segregation of duties? A. Job submission B. Resource management C. Code correction D. Output distribution
The interface that allows access to lower or higher level network services is called: A. firmware. B. middleware. C. X.25 interface. D. utilities.
Which of the following is the MOST important consideration when developing a business continuity plan for a bank? A. Antivirus software B. Naming standards C. Customer balance list D. Password policy