Relacionar Columnas Networking Ports and ProtocolVersión en línea Ports and Protocols por Mr. B 1 provides a generic method of transferring files. It can include usernames and passwords to provide file security. It allows file transfer between dissimilar computer systems. 2 allows for secure interactive control of remote systems. All communication using SSH is encrypted and is typically used to remotely login to a network device, such as a switch. 3 _____is used when sending email. 4 is used to dynamically assign IP addressing information to network hosts when they come online. 5 is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files between computers. 6 is used to retrieve email from a remote server to a local client over an IP connection 7 is used to remotely connect to another system. Be aware that all data is transmitted in cleartext. Because of this, Telnet is not used often. 8 provides address to name resolution. For example, it identifies the IP address for the name www.testout.com. 9 is a proprietary Microsoft protocol that allows a user to view and use the graphical desktop of a remote computer system as if they were sitting in front of it. 10 is used by web browsers and web servers to exchange hypermedia (such as web pages) through the World Wide Web and intranets 11 is used to monitor and manage network devices IMAP RDP SNMP SSH DNS POP3 Telnet HTTP FTP SMTP DHCP