Upgrade to remove ads
Common TCP/IP Protocols [Definitions]
Terms in this set (22)
___________________ is used by web browsers and web servers to exchange files (such as web pages) through the World Wide Web and intranets. ___________________ can be described as an information requesting and responding protocol. It is typically used to request and send web documents, but is also used as the protocol for communication between agents using different ___________________
___________________ is a secure form of HTTP that uses SSL to encrypt data before it is transmitted.
___________________ secures messages being transmitted on the Internet. It uses RSA for authentication and encryption. Web browsers use ___________________ to ensure safe web transactions. URLs that begin with https:// trigger your web browser to use __________.
___________________ ensures that messages being transmitted on the Internet are private and tamper proof. ___________________ is implemented through two protocols:
__________ Record can provide connection security with encryption (with DES for example).
___________ Handshake provides mutual authentication and choice of encryption method.
___________________ provides a generic method of transferring files. It can protect access to files by requiring usernames and passwords, and it allows file transfer between dissimilar computer systems. ___________________ can transfer both binary and text files, including HTML, to another host. ___________________ URLs are preceded by ftp:// followed by the DNS name of the ___________________ server. To log in to an ___________________ server, use ftp://username@servername.
The ___________________ does not use encryption. All data, including usernames, passwords, and files, are sent over the network as clear text.
___________________ is similar to FTP. It lets you transfer files between a host and an FTP server. However, it does not provide user authentication or error detection. ___________________ is often used when files need to be transferred between systems quickly. Because it does not perform error detection, ___________________ is faster than FTP but is susceptible to transmission errors.
___________________ uses Secure Shell (SSH) to secure data transfers. SSH ensures that ___________________ transmissions use encrypted commands and data; this prevents data from being transmitted over the network in clear text.
___________________ is used to securely transfer files between systems. Like SFTP, ___________________ relies on SSH to ensure that data and passwords are not transmitted over the network in clear text.
___________________ is used to route electronic mail through the internetwork. ___________________ is used:
Between mail servers for sending and relaying mail.
By all email clients to send mail.
By some email client programs, such as Microsoft Outlook, for receiving mail from an Exchange server.
___________________ is used to retrieve email from a remote server and download it to a local client over a TCP/IP connection.
An email client that uses ___________________ for receiving mail uses SMTP for sending mail.
___________________ is an email retrieval protocol designed to enable users to access their email from various locations, without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.
___________________ is used to automatically assign addresses and other configuration parameters to network hosts. Using a ___________________ server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host.
___________________ is a distributed system throughout the internetwork that provides address and name resolution. For example, the name www.mydomain.com would be mapped to a specific IP address.
___________________ is used to communicate time synchronization information between systems on a network.
___________________ is used to search, retrieve data from, and update a directory service. The ___________________ follows a client/server model. One or more ___________________ servers contain the directory data. The ___________________ client connects to an ___________________ Server to make a directory service request.
___________________ is designed for managing complex networks. ___________________ lets network hosts exchange configuration and status information. This information can be gathered by management software and is used to monitor and manage the network.
___________________ allows a computer to remotely access the console of a computer system somewhere else in the network. At one time, ___________________ was widely used for remote management tasks, but it is rarely used today. Because ___________________ does not use encryption, it is recommended that you use a secure alternative to ___________________ for remote management tasks, such as SSH.
___________________ allows for secure interactive control of remote systems.
___________________ uses RSA public key cryptography for both connection and authentication.
___________________ uses the IDEA algorithm for encryption by default, but it can use Blowfish and DES.
___________________ is a secure and preferred alternative to Telnet.
___________________ provides services that ensure accurate and timely delivery of network communications between two hosts. ___________________ provides the following services to ensure message delivery:
Sequencing of data packets
Acknowledgement of packets sent
Retransmission of lost packets
is a host-to-host protocol like TCP, but it does not acknowledge each packet transmitted, nor does it allow for retransmission of lost packets. This reduces its overhead, allowing for faster communications, and making it ideal for applications like streaming audio and video. However, this speed comes at the expense of possible errors or data loss.
___________________ works closely with IP to prevent errors and control information by allowing hosts to exchange packet status information. Two common management utilities, ping and traceroute, use ___________________
messages to check network connectivity. ___________________
also works with IP to send notices for the following:
-When destinations are unreachable
-Which route and hops a packet takes through the network
-Whether devices can communicate across the network
___________________ defines host groups. All group members can receive broadcast messages (multicasts) intended for the group. Multicast groups can be composed of devices within the same network or across networks (connected with a router).
THIS SET IS OFTEN IN FOLDERS WITH...
Common TCP/IP Protocols [TERMS]
Common TCP/IP Protocols [Port Numbers]
YOU MIGHT ALSO LIKE...
Net+ 1.5 Network Protocols
FBLA Network Design
OTHER SETS BY THIS CREATOR
DERIAN'S 9 WEEKS EXAM STUDY GUIDE
1st 9wks Exam