Email Protocols Flashcards

Definitions and Key Points of email protocols

1
Q

SMTP
-Definition
-Key Points

A

Definition: Simple Mail Transfer Protocol (SMTP) is a protocol used to send outgoing emails from a client to a server or between servers.

Key Points:
- Uses port 25 (unencrypted) or 587 (encrypted) for communication.
- Works in a client-server model.
- Focuses on sending instead of receiving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

POP3
-Definition
-Key Points

A

Definition: Post Office Protocol version 3 (POP3) is a protocol used to retrieve emails from a mail server to a client device.
Key Points:
- Uses port 110 (unencrypted) or 995 (encrypted) for communication.
-Operates in a client-server model.
-Typically downloads emails to the client, removing them from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IMAP
-Definition
-Key Points

A

Definition: Internet Message Access Protocol (IMAP) is a protocol used to access and manage emails stored on a mail server from multiple devices.
Key Points:
- Uses port 143 (unencrypted) or 993 (encrypted) for communication.
- Operates in a client-server model.
- Allows emails to be synchronized across devices, as they are stored on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTPS
-Definition
-Key Points

A

Definition: Simple Mail Transfer Protocol Secured (SMTPS) is a secure version of SMTP that uses encryption for sending emails.
Key Points:
- Uses port 465 for communication.
- Provides an encrypted channel for communication between the client and the server.
- Replaced by STARTLLS in modern email setups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

STARTLLS
- Definition
- Key Points

A

Definition: Start Transport Layer Security (SARTLLS) is a command used to upgrade a connection to an encrypted and secure communication channel.
Key Points:
- Used with SMTP. POP3, and IMAP protocols
-Allows for secure communication over the same ports (25, 110, 143) by initiating encryption after the connection is established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly