Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 2 Question 77 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 77
Topic #: 2
[All ISSAP Questions]

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Show Suggested Answer Hide Answer
Suggested Answer: D

generated and sent from a server to a software client to identify an interaction session.

Answer option C is incorrect. A certificate is a set of data that completely identifies an entity. It is a digitally signed statement that binds the

value of a public key to the identity of a person. It can be issued to perform a number of functions such as Web server authentication, secure

e-mail, etc. A certificate is valid only for the period of time specified within it. Moreover, a user can set the duration for a certificate's validity.

After the validity period, the certificate becomes invalid. A certificate also eliminates the need for hosts to maintain a set of passwords for

individuals who are required to be authenticated.

Answer option B is incorrect. A smart card is a credit card-sized device used to securely store personal information such as certificates, public

and private keys, passwords, etc. It is used in conjunction with a PIN number to authenticate users. In Windows, smart cards are used to

enable certificate-based authentication. To use smart cards, Extensible Authentication Protocol (EAP) must be configured in Windows.

Answer option A is incorrect. Kerberos v5 is an authentication method used by Windows operating systems to authenticate users and

network services. Windows 2000/2003 and XP clients and servers use Kerberos v5 as the default authentication method. Kerberos has

replaced the NT LAN Manager (NTLM) authentication method, which was less secure. Kerberos uses mutual authentication to verify both the

identity of the user and network services. The Kerberos authentication process is transparent to the users.

Note: Kerberos v5 is not supported on Windows XP Home clients or on any clients that are not members of an Active Directory domain.


Contribute your Thoughts:

Selma
1 months ago
Wait, is the 'Host-to-Host' layer even a real thing? I'm so confused right now.
upvoted 0 times
Keva
22 hours ago
A) The transport layer
upvoted 0 times
...
...
Lemuel
1 months ago
I bet the answer is the transport layer. That's where the magic happens, baby!
upvoted 0 times
...
Ashley
1 months ago
I'm going with the presentation layer. Isn't that where the data formatting and translation happens?
upvoted 0 times
...
Regenia
2 months ago
Nah, it's gotta be the application layer. That's where the actual data is being processed, right?
upvoted 0 times
Hoa
4 days ago
User 3: I believe it's the application layer, that's where the data is processed.
upvoted 0 times
...
Louann
9 days ago
User 2: Are you sure? I think it's the session layer.
upvoted 0 times
...
Vanda
11 days ago
User 3: No, it's the transport layer because it handles end-to-end communication.
upvoted 0 times
...
Laurel
14 days ago
User 1: Actually, it's the transport layer.
upvoted 0 times
...
Noel
23 days ago
User 2: Really? I thought it was the application layer.
upvoted 0 times
...
Viva
1 months ago
User 1: It's actually the transport layer.
upvoted 0 times
...
...
Alecia
2 months ago
I'm pretty sure it's the session layer. You know, where the session establishment and termination happen.
upvoted 0 times
Leslee
3 days ago
I agree with you, it's the session layer where the session management occurs.
upvoted 0 times
...
Shawna
1 months ago
I'm not sure, but I think it might be the presentation layer. That's where data is formatted for the application layer.
upvoted 0 times
...
Svetlana
1 months ago
No, I believe it's the application layer. That's where the actual communication between applications takes place.
upvoted 0 times
...
Lyla
2 months ago
I think it's actually the transport layer. That's where the end-to-end connections and reliability are handled.
upvoted 0 times
...
...
Cristal
2 months ago
I'm not sure, but I think it's the session layer.
upvoted 0 times
...
Paz
2 months ago
The transport layer, of course! That's where all the host-to-host communication happens.
upvoted 0 times
Robt
19 days ago
No, it's actually the transport layer for host-to-host communication.
upvoted 0 times
...
Danica
20 days ago
C) The session layer
upvoted 0 times
...
Ezekiel
1 months ago
Definitely the transport layer, that's where the magic happens!
upvoted 0 times
...
Jarvis
2 months ago
A) The transport layer
upvoted 0 times
...
...
Ressie
2 months ago
I agree with Fredric. The transport layer corresponds to the Host-to-Host layer in the TCP/IP model.
upvoted 0 times
...
Fredric
3 months ago
I think it's the transport layer.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77