Internet Protocol Analysis/Application Layer/Quiz

{ The application layer is an abstraction layer reserved for communications protocols and methods designed for { process-to-process (i) _20 } communications across an Internet Protocol (IP) computer network.
 * type="{}" coef="1"}

{ Application layer protocols use the underlying transport layer protocols to establish { host-to-host (i) _14 } connections.
 * type="{}" coef="1"}

{ The Hypertext Transfer Protocol (HTTP) is an application protocol for { distributed, collaborative, hypermedia information systems (i) _60 }.
 * type="{}" coef="1"}

{ HTTP functions as a { request-response (i) _18 } protocol in the { client-server (i) _15 } computing model.
 * type="{}" coef="2"}

{ HTTP uses { TCP (i) _5 } as its transport protocol and servers listen on port { 80 _4 } by default.
 * type="{}" coef="2"}

{ HTTP defines methods that may be performed on the desired resource. Methods include { GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS, CONNECT, and PATCH (i) _66 }.
 * type="{}" coef="1"}

{ HTTP requests include { a request line, headers, an empty line, and an optional message body (i) _70 }.
 * type="{}" coef="1"}

{ HTTP responses include { a status line, header, an empty line, and an optional message body (i) _68 }.
 * type="{}" coef="1"}

{ Hypertext Transfer Protocol Secure (HTTPS) is a widely used communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in itself; rather, it is { the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the Secure Sockets Layer / Transport Layer Security (SSL/TLS) protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications (i) _233 }.
 * type="{}" coef="1"}

{ HTTPS uses { TCP (i) _5 } as its transport protocol and servers listen on port { 443 _5 } by default.
 * type="{}" coef="2"}

{ Web servers supporting HTTPS connections must have a public key certificate { signed by a certificate authority the web browser trusts in order to connect without a client warning (i) _103 }.
 * type="{}" coef="1"}

{ TLS and SSL encrypt the segments of network connections at the Application Layer for the Transport Layer, using { asymmetric cryptography for key exchange, symmetric encryption for confidentiality, and message authentication codes for message integrity (i) _140 }.
 * type="{}" coef="1"}

{ TLS handshaking includes { the exchange of settings, server authentication, optional client authentication, and public key encryption of a symmetric session key (i) _135 }.
 * type="{}" coef="1"}

{ Simple Mail Transfer Protocol (SMTP) is an Internet standard for { electronic mail (e-mail) transmission across Internet Protocol (IP) networks (i) _78 }.
 * type="{}" coef="1"}

{ Client applications use { SMTP (i) _6 } for sending messages to a mail server, but usually use either { the Post Office Protocol (POP) (i) _32 } or { the Internet Message Access Protocol (IMAP) (i) _45 } or a proprietary system to access their mail box accounts on a mail server.
 * type="{}" coef="3"}

{ Client applications should use TCP port { 587 _5 } to submit SMTP messages to a server. Servers use TCP port { 25 _4 } to transfer SMTP messages to destination servers.
 * type="{}" coef="2"}

{ SMTP transactions include commands for { MAIL, RCPT, and DATA (i) _22 }.
 * type="{}" coef="1"}