2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center
3. A device that connects one network to another is called a Router
4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open Systems Interconnection (OSI) Reference model and 7 layers
5. Protocols that do not guarantee deliver of their data, but do operate with a very low overhead that conserve network bandwidth are called Connectionless-Oriented Protocol
6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe
7. The Windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called NSLookup.exe
8. Most networks use ________ to dynamically assign addresses and configure computers to use them. DHCP
9. The Windows 7 command line utility that displays a list of the routers currently forwarding packets to a particular destination is called TRACERT.EXE
10. The top and bottom layers of the OSI model are called the Application and Physical Layer
1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall
2. The ________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center
3. A device that connects one network to another is called a Router
4. The most common method for illustrating the operations of a network stack is the ________ , which consists of ________ layers.
Open