Chapter 3: Network Technologies and Tools Aconyms and Defintions Flashcards
(89 cards)
MAC
Media Access Control
IP
Internet Protocol
TCP
Transmission Control Protocol
Connection-oriented protocol that provides guarenteed delivery
UDP
User Datagram Protocol
Connectionless protocol that provides âbest effortâ delivery
FTP
File Transfer Protocol
Uploads and downloads files to and from an FTP server.
Transmits data in clear text
TFTP
Trivial File Transfer Protocol
Used to transfer a smaller amounts of data, such as when communicating with network devices
SSL
Secure Sockets Layer
Primarily used to secure HTTP traffic as HTTPS
Has been compromised and is not recommended for use
TLS
Transport Layer Security
Replacement for SSL
Secure HTTP traffic as HTTPS
IPsec
Internet Protocol Security
Used to encrypt IP traffic
SSH
Secure Shell
Encrypts data traffic it transittransit and can be used to encrypt other protocols such as FTP
SCP
Secure Copy
Based on SSH and used to copy and encrypted files over a network
SFTP
Secure File Transfer Protocol
Secure implementation of FTP
And extinction of secure shell using SSH to transmit the files in an encrypted format
FTPS
File Transfer Protocol Secure
Another secure implementation of FTP.
It uses TLC to encrypt FTP traffic
SMTP
Simple Mail Transfer Protocol
Transfers, mail between clients and SMTP servers
SMTPS
Simple Mail Transfer Protocol Secure
Adds TLS encryption
POP3
Post Office Protocol
Transfers emails from servers to end users
IMAP
Internet Message Access Protocol
Used to store email on a mail server and it allows you to organize and manage email and folders on the server
HTTP
Hyper Text Transfer Protocol
Transmits web traffic between web service and browsers
HTTPS
Hyper Text Transfer Protocol Secure
Adds TLS encryption to protect the data
SPF
Sender Policy Framework
Uses DNS records to define which IP addresses are authorized to send emails on behalf of a domain
DKIM
DomainKeys Identified Mail
Uses public key photography to sign in verify an emails domain and content
DMARC
Domain-based Message Authentication, Reporting, and Conformance
Builds on top of SPF and DKIM by allowing domain owners to set policies for how to handle emails that fail authentication checks
AD DS
Microsoft Active Directory Domain Services
Database of objects that provides a central access point to manage users, computers, and other directory objects.
LDAP
Lightweight Directory Access Protocol
Specifies the formats and methods used to query directories, such as Microsoft AD DS