New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 2 Question 77 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 77
Topic #: 2
[All ISSAP Questions]

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

Show Suggested Answer Hide Answer
Suggested Answer: D

generated and sent from a server to a software client to identify an interaction session.

Answer option C is incorrect. A certificate is a set of data that completely identifies an entity. It is a digitally signed statement that binds the

value of a public key to the identity of a person. It can be issued to perform a number of functions such as Web server authentication, secure

e-mail, etc. A certificate is valid only for the period of time specified within it. Moreover, a user can set the duration for a certificate's validity.

After the validity period, the certificate becomes invalid. A certificate also eliminates the need for hosts to maintain a set of passwords for

individuals who are required to be authenticated.

Answer option B is incorrect. A smart card is a credit card-sized device used to securely store personal information such as certificates, public

and private keys, passwords, etc. It is used in conjunction with a PIN number to authenticate users. In Windows, smart cards are used to

enable certificate-based authentication. To use smart cards, Extensible Authentication Protocol (EAP) must be configured in Windows.

Answer option A is incorrect. Kerberos v5 is an authentication method used by Windows operating systems to authenticate users and

network services. Windows 2000/2003 and XP clients and servers use Kerberos v5 as the default authentication method. Kerberos has

replaced the NT LAN Manager (NTLM) authentication method, which was less secure. Kerberos uses mutual authentication to verify both the

identity of the user and network services. The Kerberos authentication process is transparent to the users.

Note: Kerberos v5 is not supported on Windows XP Home clients or on any clients that are not members of an Active Directory domain.


Contribute your Thoughts:

0/2000 characters
Kirk
3 months ago
Surprised this is even a question!
upvoted 0 times
...
Bok
3 months ago
I thought the application layer was more about that.
upvoted 0 times
...
Solange
3 months ago
Wait, isn't it the session layer?
upvoted 0 times
...
Penney
4 months ago
Agreed, A is the right answer.
upvoted 0 times
...
Kenneth
4 months ago
It's definitely the transport layer!
upvoted 0 times
...
Eric
4 months ago
I’m leaning towards the transport layer too, but I wonder if the presentation layer could be a trick option here.
upvoted 0 times
...
Truman
4 months ago
Wait, is the Host-to-Host layer the same as the session layer? I feel like I mixed those up in my notes.
upvoted 0 times
...
Kris
4 months ago
I remember practicing a question like this, and I think the answer was definitely the transport layer.
upvoted 0 times
...
Alfred
5 months ago
I think the Host-to-Host layer is related to the transport layer, but I'm not completely sure.
upvoted 0 times
...
Virgina
5 months ago
I'm not entirely confident, but I think the session layer of the OSI model is the closest match to the Host-to-Host layer in TCP/IP, so I'll select option C.
upvoted 0 times
...
Devon
5 months ago
The transport layer is responsible for end-to-end communication, so that seems like the most logical choice here. I'll go with option A.
upvoted 0 times
...
Viola
5 months ago
Hmm, I'm a bit confused on the differences between the OSI and TCP/IP models. I'll need to think this through carefully before selecting an answer.
upvoted 0 times
...
Lon
5 months ago
I'm pretty sure the transport layer of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model, so I'll go with option A.
upvoted 0 times
...
Jospeh
5 months ago
Okay, let me see... The Default Scan task, that's got to be a Scheduled Scan, right? I'll go with that.
upvoted 0 times
...
Floyd
5 months ago
Okay, I remember learning about the TOGAF Architecture Governance Framework in class. I believe the correct answer is A - it's an approach to ensure the effectiveness of an organization's architectures.
upvoted 0 times
...
Phyliss
5 months ago
Hmm, I'm a bit unsure about this one. There are a few different report types mentioned, and I want to make sure I select the one that covers all the specific metrics they're asking about. I'll need to review the details of each report type to determine the best answer.
upvoted 0 times
...
Selma
9 months ago
Wait, is the 'Host-to-Host' layer even a real thing? I'm so confused right now.
upvoted 0 times
Melvin
8 months ago
D) The application layer
upvoted 0 times
...
Xochitl
8 months ago
C) The session layer
upvoted 0 times
...
Emmanuel
8 months ago
B) The presentation layer
upvoted 0 times
...
Keva
8 months ago
A) The transport layer
upvoted 0 times
...
...
Lemuel
9 months ago
I bet the answer is the transport layer. That's where the magic happens, baby!
upvoted 0 times
Sherly
8 months ago
D) The application layer
upvoted 0 times
...
Jina
8 months ago
No, that's not correct.
upvoted 0 times
...
Winfred
8 months ago
A) The transport layer
upvoted 0 times
...
...
Ashley
10 months ago
I'm going with the presentation layer. Isn't that where the data formatting and translation happens?
upvoted 0 times
...
Regenia
10 months ago
Nah, it's gotta be the application layer. That's where the actual data is being processed, right?
upvoted 0 times
Hoa
8 months ago
User 3: I believe it's the application layer, that's where the data is processed.
upvoted 0 times
...
Louann
9 months ago
User 2: Are you sure? I think it's the session layer.
upvoted 0 times
...
Vanda
9 months ago
User 3: No, it's the transport layer because it handles end-to-end communication.
upvoted 0 times
...
Laurel
9 months ago
User 1: Actually, it's the transport layer.
upvoted 0 times
...
Noel
9 months ago
User 2: Really? I thought it was the application layer.
upvoted 0 times
...
Viva
9 months ago
User 1: It's actually the transport layer.
upvoted 0 times
...
...
Alecia
10 months ago
I'm pretty sure it's the session layer. You know, where the session establishment and termination happen.
upvoted 0 times
Leslee
8 months ago
I agree with you, it's the session layer where the session management occurs.
upvoted 0 times
...
Shawna
10 months ago
I'm not sure, but I think it might be the presentation layer. That's where data is formatted for the application layer.
upvoted 0 times
...
Svetlana
10 months ago
No, I believe it's the application layer. That's where the actual communication between applications takes place.
upvoted 0 times
...
Lyla
10 months ago
I think it's actually the transport layer. That's where the end-to-end connections and reliability are handled.
upvoted 0 times
...
...
Cristal
10 months ago
I'm not sure, but I think it's the session layer.
upvoted 0 times
...
Paz
11 months ago
The transport layer, of course! That's where all the host-to-host communication happens.
upvoted 0 times
Robt
9 months ago
No, it's actually the transport layer for host-to-host communication.
upvoted 0 times
...
Danica
9 months ago
C) The session layer
upvoted 0 times
...
Ezekiel
10 months ago
Definitely the transport layer, that's where the magic happens!
upvoted 0 times
...
Jarvis
10 months ago
A) The transport layer
upvoted 0 times
...
...
Ressie
11 months ago
I agree with Fredric. The transport layer corresponds to the Host-to-Host layer in the TCP/IP model.
upvoted 0 times
...
Fredric
11 months ago
I think it's the transport layer.
upvoted 0 times
...

Save Cancel