31 terms

6.2 Protocols- COMPTIA A+ Essentials

LabSim flashcards 6.2.2 Protocol Facts
A ___ is a rule that identifies some aspect of how computers communicate on a network.
For two computers to communicate, they must be using the same ____.
Protocols are grouped into protocol ____, or sets of related protocols that are meant to be used together.
____ is the protocol suite used on the Internet and on most networks. Nearly all computers today use this protocol for communication.
____ is the term used to describe the combination of two protocols: NetBEUI and NetBIOS.
Beginning with Windows ____, NetBIOS is no longer required. However, NetBIOS might be needed if the network includes clients running previous versions of Windows.
NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with ____ to enable internetwork communications.
Virtually all operating systems today provide native (built-in) support for the ____ protocol.
Most older versions of some operating systems used a different protocol as the default protocol suite. For example, older NetWare servers used IPX/SPX, while Mac OS systems used ____.
Older operating systems without native TCP/IP support enabled TCP/IP communications by either installing the protocol stack or through a process known as ____ or tunneling.
Non-TCP/IP packets are re-packaged as TCP/IP packets at the sending device. The receiving device strips off the TCP/IP headers to reveal the original ____.
HTTP (HyperText Transfer Protocol)
____ is used by Web browsers and Web servers to exchange files (such as Web pages) through the World Wide Web and intranets.
HTTP (HyperText Transfer Protocol)
____ can be described as an information requesting and responding protocol. It is typically used to request and send Web documents, but is also used as the protocol for communication between agents using different TCP/IP protocols.
HTML (HyperText Markup Language)
____ is a data format that is used to create hypertext documents that can be viewed from multiple platforms.
SSL (Secure Sockets Layer)
____ secures messages being transmitted on the Internet. It uses RSA for authentication and encryption.
SSL (Secure Sockets Layer)
Web browsers use ____ to ensure safe Web transactions. URLs that begin with https:// trigger your Web browser to use it.
____ is a secure form of HTTP that uses SSL as a sublayer for security.
FTP (File Transfer Protocol)
____ provides a generic method of transferring files.
FTP can include file ____ through usernames and passwords, and it allows file transfer between dissimilar computer systems.
Binary text
FTP can transfer both ____ and ____ files, including HTML, to another host.
DNS (Domain Name System)
FTP URLs are preceded by ftp:// followed by the ____ name of the FTP server.
To log in to an FTP server, use: ftp://username@____.
SMTP (Simple Mail Transfer Protocol)
____ is used to route electronic mail through the internetwork. E-mail applications provide the interface to communicate with this or mail servers.
IMAP (Internet Message Access Protocol)
____ is an e-mail retrieval protocol designed to enable users to access their e-mail from various locations without the need to transfer messages or files back and forth between computers.
IMAP (Internet Message Access Protocol)
With ____, messages remain on the remote mail server and are not automatically downloaded to a client system.
POP3 (Post Office Protocol 3)
____ is part of the TCP/IP protocol suite and used to retrieve e-mail from a remote server to a local client over a TCP/IP connection.
POP3 (Post Office Protocol 3)
With ____, e-mail messages are downloaded to the client.
Telnet (Remote Terminal Emulation)
____ allows an attached computer to act as a dumb terminal, with data processing taking place on the TCP/IP host computer. It is still widely used to provide connectivity between dissimilar systems.
Telnet (Remote Terminal Emulation)
____ can also be used to test a service by the use of HTTP commands.
SSH (Secure Shell)
____ allows for secure interactive control of remote systems. It is a secure and acceptable alternative to Telnet.
DNS (Domain Name System)
____ is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address.