____ allows you to configure the security settings for each location type differently.
Network location awareness
The ____ location type is used when the computer is connected as part of a peer-to-peer network in a trusted location.
The ____ location type is used when the computer is connected in an untrusted public location such as an airport.
The ____ location type is used in corporate environments when your computer is part of a domain network.
____ define how much data can be sent and the format of the data as it crosses the network.
____ is an updated version of TCP/IPv4 with a larger address space and additional features.
The ____ protocol is responsible for discovering network devices on the network, such as computers and routers.
Link-Layer Topology Discovery Mapper I/O Driver
The ____ protocol is responsible for responding to discovery requests from other computers.
Link-Layer Topology Discovery Responder
The ____ interface supports communication between applications and the TCP/IP protocol.
Windows Sockets (Winsock) user mode
The ____ interface supports communication between clients or services and protocols, including TCP/IP.
Transport Device Interface (TDI)
The ____ interface supports communication between protocols and network drivers.
Network Driver Interface Specification (NDIS)
An IP address is composed of a network ID and a ____ ID.
The most common use for ____ is resolving host names to IP addresses.
____ is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices.
If Windows 7 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use a(n) ____ address.
In Windows 7, support for IPv6 and IPv4 (the current standard) have been built into a single TCP/IP protocol stack (____).
____ simplifies folder and file sharing by controlling both NTFS permissions and share permissions at the same time.
"Share with" method
DSL connections usually use ____ to secure connections.
The two most common mechanisms for sharing an IP address are a router or ____.
The ____ in Windows 7 allows you to connect two separate networks, with Windows 7 acting as a bridge between them.