Relacionar Columnas Networking Ports and ProtocolVersión en línea Ports and Protocols por Mr. B 1 is used to retrieve email from a remote server to a local client over an IP connection 2 is used to dynamically assign IP addressing information to network hosts when they come online. 3 allows for secure interactive control of remote systems. All communication using SSH is encrypted and is typically used to remotely login to a network device, such as a switch. 4 is used by web browsers and web servers to exchange hypermedia (such as web pages) through the World Wide Web and intranets 5 provides a generic method of transferring files. It can include usernames and passwords to provide file security. It allows file transfer between dissimilar computer systems. 6 provides address to name resolution. For example, it identifies the IP address for the name www.testout.com. 7 is a proprietary Microsoft protocol that allows a user to view and use the graphical desktop of a remote computer system as if they were sitting in front of it. 8 is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files between computers. 9 is used to remotely connect to another system. Be aware that all data is transmitted in cleartext. Because of this, Telnet is not used often. 10 _____is used when sending email. 11 is used to monitor and manage network devices SMTP POP3 Telnet HTTP RDP IMAP DHCP SNMP FTP DNS SSH