🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 32 minutes remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

Networking Fundamentals (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

Address Resolution Protocol
Automatically assigns IP addresses to devices on a network
Classless Inter-Domain Routing
What does CIDR stand for
21
Define a Packet
A formatted unit of data used in networking for communication
SSL/TLS
What does DHCP do
What does ARP stand for
Name a protocol that operates at the Presentation layer of the OSI model
What port does FTP use for control commands
FrontBack
At which OSI layer does IP addressing operateNetwork layer
Define a PacketA formatted unit of data used in networking for communication
In the OSI modelat what layer does a switch operate,Data Link layer
Name a protocol that operates at the Presentation layer of the OSI modelSSL/TLS
Name one type of wireless network encryptionWPA2
Name the seven layers of the OSI modelPhysical, Data Link, Network, Transport, Session, Presentation, Application
What does a standard web proxy server filterHTTP and HTTPS traffic
What does ARP stand forAddress Resolution Protocol
What does CIDR stand forClassless Inter-Domain Routing
What does DHCP doAutomatically assigns IP addresses to devices on a network
What does DHCP stand forDynamic Host Configuration Protocol
What does NAT stand forNetwork Address Translation
What does TCP stand forTransmission Control Protocol
What does the Transport layer of the OSI model handleEnd-to-end communication, error correction, and flow control
What does VPN stand forVirtual Private Network
What is a key function of a VLANTo segment a network logically irrespective of physical topology
What is a MAC addressA unique hardware identifier assigned to a network interface card
What is a Ping SweepAn ICMP-based method to identify active hosts on a network
What is a VLANVirtual Local Area Network
What is an example of a Class A IP address10.0.0.1
What is the default subnet mask for a Class C IP address255.255.255.0
What is the difference between IPv4 and IPv6 addressingIPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses
What is the function of a Proxy serverTo act as an intermediary between clients and servers for requests
What is the function of the Transport layer in the TCP/IP modelDelivering data and ensuring its completeness
What is the limitation of TelnetIt sends data, including passwords, in plaintext making it insecure
What is the most common port for remote desktop protocol3389
What is the port number for HTTP80
What is the primary characteristic of a TCP connectionReliable and connection-oriented
What is the primary function of DNSTo translate domain names into IP addresses
What is the primary function of ICMPTo send error messages and operational information about IP-based communication
What is the primary purpose of a subnet maskTo divide an IP network into sub-networks for better organization
What is the primary use of TelnetTo remotely access and manage devices over a network
What is the purpose of a DMZ in network securityTo provide an additional layer of protection by isolating public-facing services
What is the purpose of NATTo allow multiple devices to share a single public IP address
What is the purpose of the ARP protocolTo map IP addresses to MAC addresses
What is the purpose of the OSI modelTo standardize networking frameworks and guide interoperability between systems
What is the role of a VPNTo securely connect networks and protect data in transit over the internet
What port does FTP use for control commands21
What protocol is a secure alternative to TelnetSSH (Secure Shell)
What protocol is used for fastconnectionless communication,UDP (User Datagram Protocol)
What type of device connects two different networksRouter
What type of network topology uses a single central connection point like a hubStar topology
Which device operates at the Physical layer of the OSI modelHub
Which layer of the OSI model do firewalls typically operate onNetwork or Transport layer
Which protocol is used for secure web trafficHTTPS
Front
Name the seven layers of the OSI model
Click the card to flip
Back
Physical, Data Link, Network, Transport, Session, Presentation, Application
Front
What does ARP stand for
Back
Address Resolution Protocol
Front
What does VPN stand for
Back
Virtual Private Network
Front
What does a standard web proxy server filter
Back
HTTP and HTTPS traffic
Front
What is the role of a VPN
Back
To securely connect networks and protect data in transit over the internet
Front
What is the primary function of DNS
Back
To translate domain names into IP addresses
Front
What protocol is used for fast
Back
connectionless communication,UDP (User Datagram Protocol)
Front
What is the purpose of NAT
Back
To allow multiple devices to share a single public IP address
Front
What is the port number for HTTP
Back
80
Front
What is the function of a Proxy server
Back
To act as an intermediary between clients and servers for requests
Front
What is the difference between IPv4 and IPv6 addressing
Back
IPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses
Front
What is a key function of a VLAN
Back
To segment a network logically irrespective of physical topology
Front
Which protocol is used for secure web traffic
Back
HTTPS
Front
What is the primary purpose of a subnet mask
Back
To divide an IP network into sub-networks for better organization
Front
What does NAT stand for
Back
Network Address Translation
Front
What is the primary characteristic of a TCP connection
Back
Reliable and connection-oriented
Front
What is an example of a Class A IP address
Back
10.0.0.1
Front
What does TCP stand for
Back
Transmission Control Protocol
Front
What does CIDR stand for
Back
Classless Inter-Domain Routing
Front
What protocol is a secure alternative to Telnet
Back
SSH (Secure Shell)
Front
What port does FTP use for control commands
Back
21
Front
What is the most common port for remote desktop protocol
Back
3389
Front
Which layer of the OSI model do firewalls typically operate on
Back
Network or Transport layer
Front
What does the Transport layer of the OSI model handle
Back
End-to-end communication, error correction, and flow control
Front
What type of network topology uses a single central connection point like a hub
Back
Star topology
Front
Define a Packet
Back
A formatted unit of data used in networking for communication
Front
Which device operates at the Physical layer of the OSI model
Back
Hub
Front
What is the purpose of a DMZ in network security
Back
To provide an additional layer of protection by isolating public-facing services
Front
What does DHCP do
Back
Automatically assigns IP addresses to devices on a network
Front
What is the purpose of the OSI model
Back
To standardize networking frameworks and guide interoperability between systems
Front
At which OSI layer does IP addressing operate
Back
Network layer
Front
What is the purpose of the ARP protocol
Back
To map IP addresses to MAC addresses
Front
What is the default subnet mask for a Class C IP address
Back
255.255.255.0
Front
Name a protocol that operates at the Presentation layer of the OSI model
Back
SSL/TLS
Front
Name one type of wireless network encryption
Back
WPA2
Front
What is a Ping Sweep
Back
An ICMP-based method to identify active hosts on a network
Front
What does DHCP stand for
Back
Dynamic Host Configuration Protocol
Front
What is a VLAN
Back
Virtual Local Area Network
Front
What type of device connects two different networks
Back
Router
Front
What is the limitation of Telnet
Back
It sends data, including passwords, in plaintext making it insecure
Front
What is a MAC address
Back
A unique hardware identifier assigned to a network interface card
Front
What is the primary use of Telnet
Back
To remotely access and manage devices over a network
Front
What is the function of the Transport layer in the TCP/IP model
Back
Delivering data and ensuring its completeness
Front
What is the primary function of ICMP
Back
To send error messages and operational information about IP-based communication
Front
In the OSI model
Back
at what layer does a switch operate,Data Link layer
1/45
This deck covers essential networking concepts, including protocols, OSI and TCP/IP models, network topologies, and types of network devices critical for ethical hacking.
Share on...
Follow us on...