An information security administrator wishes to block peer-to-peer (P2P) traffic over Hypertext Transfer Protocol (HTTP) tunnels. Which of the following layers of the Open Systems Interconnection (OSI) model requires inspection?
A. Application layer
P2P traffic is typically classified and controlled at the application layer because P2P protocols often use specific port numbers or patterns of behavior that can be identified by inspecting the content and behavior of the application layer traffic.
The other layers of the OSI model, such as the Transport, Session, and Presentation layers, are generally not as directly involved in identifying and controlling P2P traffic as the Application layer.
There's no such thing as P2P over HTTP, except in some obscure IEEE publication somewhere. As for P2P, it can only be blocked in the Application layer.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
629f731
10 months, 2 weeks agoSoleandheel
11 months, 2 weeks agoJamati
2 years agojackdryan
1 year, 6 months agordy4u
2 years ago