Acronyms & Definitions Flashcards
DHCP
The dynamic host configuration protocol is a network management protocol used on the Internet protocol networks for automatically assigning IP addresses to devices connected to the network, using a client-server architecture
DNS
Used to associate IP addresses with the domain names, DNS local name queries go on UDP 53, whereas DNS Zone Transfer goes on TCP 53
Default TFTP
TFP’s main difference from FTP is the transport protocol it uses and the lack of any authentication mechanisim. Where FTP uses the robust TCP protocol to establish connections and complete the file transfers, TFTP uses the UDP protocol which is unsecure and has no error checking built in to it
FTPS
FTPS is an extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL cryptographic protocols.
HTTP
The hypertext transfer protocol is used to load up, pages on the Internet, using hyperlinks
HTTPS
HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. As a result, HTTPS is far more secure than HTTP. A website that uses HTTP has HTTP:// in its URL, while a website that uses
HTTPS has HTTPS://
IMAP4
Internet Message Access Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/ IP connection. It is not encrypted at all.
IMAP4S
Secure Internet Message Access
Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. It is encrypted using SSL or TLS.
IPSec
Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPN) for creating secure tunnels.
Kerberos
Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
L2TP
Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It uses encryption only for its own control messages, and does not provide any encryption or confidentiality of content by itself.
LDAP
Companies store usernames, passwords, email addresses, printer connections, and other static data within directories. LDAP is an open, vendor-neutral application protocol for accessing and maintaining that data. LDAP can also tackle authentication, so users can sign on just once and access many different files on the server. This is not encrypted
LDAP/S
This is encrypted version of LDAP using SSL or TLS for encryption.
NTP
NTP is an internet protocol that’s used to synchronize the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC).
NetBIOS
NetBIOs is a non-routable OSI
Session Layer 5 Protocol and a service that allows applications on computers to communicate with one another over a local area network (LAN). It is used in Windows for its file and printer sharing.