Relacionar Columnas Networking Ports and ProtocolVersión en línea Ports and Protocols por Mr. B 1 is used by web browsers and web servers to exchange hypermedia (such as web pages) through the World Wide Web and intranets 2 allows for secure interactive control of remote systems. All communication using SSH is encrypted and is typically used to remotely login to a network device, such as a switch. 3 is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files between computers. 4 is used to monitor and manage network devices 5 is a proprietary Microsoft protocol that allows a user to view and use the graphical desktop of a remote computer system as if they were sitting in front of it. 6 provides a generic method of transferring files. It can include usernames and passwords to provide file security. It allows file transfer between dissimilar computer systems. 7 _____is used when sending email. 8 is used to retrieve email from a remote server to a local client over an IP connection 9 is used to remotely connect to another system. Be aware that all data is transmitted in cleartext. Because of this, Telnet is not used often. 10 is used to dynamically assign IP addressing information to network hosts when they come online. 11 provides address to name resolution. For example, it identifies the IP address for the name www.testout.com. HTTP DNS Telnet SNMP SSH FTP DHCP POP3 SMTP RDP IMAP