6.2 Protocols- COMPTIA A+ Essentials

Created by jasonwebber 

Upgrade to
remove ads

LabSim flashcards 6.2.2 Protocol Facts

Protocol

A ___ is a rule that identifies some aspect of how computers communicate on a network.

Protocol

For two computers to communicate, they must be using the same ____.

Suites

Protocols are grouped into protocol ____, or sets of related protocols that are meant to be used together.

TCP/IP

____ is the protocol suite used on the Internet and on most networks. Nearly all computers today use this protocol for communication.

NetBIOS

____ is the term used to describe the combination of two protocols: NetBEUI and NetBIOS.

2000

Beginning with Windows ____, NetBIOS is no longer required. However, NetBIOS might be needed if the network includes clients running previous versions of Windows.

TCP/IP

NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with ____ to enable internetwork communications.

TCP/IP

Virtually all operating systems today provide native (built-in) support for the ____ protocol.

AppleTalk

Most older versions of some operating systems used a different protocol as the default protocol suite. For example, older NetWare servers used IPX/SPX, while Mac OS systems used ____.

Encapsulation

Older operating systems without native TCP/IP support enabled TCP/IP communications by either installing the protocol stack or through a process known as ____ or tunneling.

Packets

Non-TCP/IP packets are re-packaged as TCP/IP packets at the sending device. The receiving device strips off the TCP/IP headers to reveal the original ____.

HTTP (HyperText Transfer Protocol)

____ is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets.

HTTP (HyperText Transfer Protocol)

____ can be described as an information requesting and responding protocol. It is typically used to request and send Web documents, but is also used as the protocol for communication between agents using different TCP/IP protocols.

HTML (HyperText Markup Language)

____ is a data format that is used to create hypertext documents that can be viewed from multiple platforms.

SSL (Secure Sockets Layer)

____ secures messages being transmitted on the Internet. It uses RSA for authentication and encryption.

SSL (Secure Sockets Layer)

Web browsers use ____ to ensure safe Web transactions. URLs that begin with https:// trigger your Web browser to use it.

HTTPS (HTTP over SSL)

____ is a secure form of HTTP that uses SSL as a sublayer for security.

FTP (File Transfer Protocol)

____ provides a generic method of transferring files.

Security

FTP can include file ____ through usernames and passwords, and it allows file transfer between dissimilar computer systems.

Binary text

FTP can transfer both ____ and ____ files, including HTML, to another host.

DNS (Domain Name System)

FTP URLs are preceded by ftp:// followed by the ____ name of the FTP server.

Servername

To log in to an FTP server, use: ftp://username@____.

SMTP (Simple Mail Transfer Protocol)

____ is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with this or mail servers.

IMAP (Internet Message Access Protocol)

____ is an e-mail retrieval protocol designed to enable users to access their e-mail from various locations without the need to transfer messages or files back and forth between computers.

IMAP (Internet Message Access Protocol)

With ____, messages remain on the remote mail server and are not automatically downloaded to a client system.

POP3 (Post Office Protocol 3)

____ is part of the TCP/IP protocol suite and used to retrieve e-mail from a remote server to a local client over a TCP/IP connection.

POP3 (Post Office Protocol 3)

With ____, e-mail messages are downloaded to the client.

Telnet (Remote Terminal Emulation)

____ allows an attached computer to act as a dumb terminal, with data processing taking place on the TCP/IP host computer. It is still widely used to provide connectivity between dissimilar systems.

Telnet (Remote Terminal Emulation)

____ can also be used to test a service by the use of HTTP commands.

SSH (Secure Shell)

____ allows for secure interactive control of remote systems. It is a secure and acceptable alternative to Telnet.

DNS (Domain Name System)

____ is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set