Bash, the Crucial Exams Chat Bot
AI Bot
Networking Fundamentals (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards
| Front | Back |
| At which OSI layer does IP addressing operate | Network layer |
| Define a Packet | A formatted unit of data used in networking for communication |
| In the OSI model | at what layer does a switch operate,Data Link layer |
| Name a protocol that operates at the Presentation layer of the OSI model | SSL/TLS |
| Name one type of wireless network encryption | WPA2 |
| Name the seven layers of the OSI model | Physical, Data Link, Network, Transport, Session, Presentation, Application |
| What does a standard web proxy server filter | HTTP and HTTPS traffic |
| What does ARP stand for | Address Resolution Protocol |
| What does CIDR stand for | Classless Inter-Domain Routing |
| What does DHCP do | Automatically assigns IP addresses to devices on a network |
| What does DHCP stand for | Dynamic Host Configuration Protocol |
| What does NAT stand for | Network Address Translation |
| What does TCP stand for | Transmission Control Protocol |
| What does the Transport layer of the OSI model handle | End-to-end communication, error correction, and flow control |
| What does VPN stand for | Virtual Private Network |
| What is a key function of a VLAN | To segment a network logically irrespective of physical topology |
| What is a MAC address | A unique hardware identifier assigned to a network interface card |
| What is a Ping Sweep | An ICMP-based method to identify active hosts on a network |
| What is a VLAN | Virtual Local Area Network |
| What is an example of a Class A IP address | 10.0.0.1 |
| What is the default subnet mask for a Class C IP address | 255.255.255.0 |
| What is the difference between IPv4 and IPv6 addressing | IPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses |
| What is the function of a Proxy server | To act as an intermediary between clients and servers for requests |
| What is the function of the Transport layer in the TCP/IP model | Delivering data and ensuring its completeness |
| What is the limitation of Telnet | It sends data, including passwords, in plaintext making it insecure |
| What is the most common port for remote desktop protocol | 3389 |
| What is the port number for HTTP | 80 |
| What is the primary characteristic of a TCP connection | Reliable and connection-oriented |
| What is the primary function of DNS | To translate domain names into IP addresses |
| What is the primary function of ICMP | To send error messages and operational information about IP-based communication |
| What is the primary purpose of a subnet mask | To divide an IP network into sub-networks for better organization |
| What is the primary use of Telnet | To remotely access and manage devices over a network |
| What is the purpose of a DMZ in network security | To provide an additional layer of protection by isolating public-facing services |
| What is the purpose of NAT | To allow multiple devices to share a single public IP address |
| What is the purpose of the ARP protocol | To map IP addresses to MAC addresses |
| What is the purpose of the OSI model | To standardize networking frameworks and guide interoperability between systems |
| What is the role of a VPN | To securely connect networks and protect data in transit over the internet |
| What port does FTP use for control commands | 21 |
| What protocol is a secure alternative to Telnet | SSH (Secure Shell) |
| What protocol is used for fast | connectionless communication,UDP (User Datagram Protocol) |
| What type of device connects two different networks | Router |
| What type of network topology uses a single central connection point like a hub | Star topology |
| Which device operates at the Physical layer of the OSI model | Hub |
| Which layer of the OSI model do firewalls typically operate on | Network or Transport layer |
| Which protocol is used for secure web traffic | HTTPS |
Front
What does NAT stand for
Click the card to flip
Back
Network Address Translation
Front
What protocol is a secure alternative to Telnet
Back
SSH (Secure Shell)
Front
What does CIDR stand for
Back
Classless Inter-Domain Routing
Front
Which device operates at the Physical layer of the OSI model
Back
Hub
Front
What is the role of a VPN
Back
To securely connect networks and protect data in transit over the internet
Front
What port does FTP use for control commands
Back
21
Front
What is a key function of a VLAN
Back
To segment a network logically irrespective of physical topology
Front
Name one type of wireless network encryption
Back
WPA2
Front
What is the purpose of the OSI model
Back
To standardize networking frameworks and guide interoperability between systems
Front
What does TCP stand for
Back
Transmission Control Protocol
Front
What is an example of a Class A IP address
Back
10.0.0.1
Front
What is the function of the Transport layer in the TCP/IP model
Back
Delivering data and ensuring its completeness
Front
What is a MAC address
Back
A unique hardware identifier assigned to a network interface card
Front
What protocol is used for fast
Back
connectionless communication,UDP (User Datagram Protocol)
Front
What does ARP stand for
Back
Address Resolution Protocol
Front
What is the primary characteristic of a TCP connection
Back
Reliable and connection-oriented
Front
What does VPN stand for
Back
Virtual Private Network
Front
What is the purpose of NAT
Back
To allow multiple devices to share a single public IP address
Front
What is the port number for HTTP
Back
80
Front
In the OSI model
Back
at what layer does a switch operate,Data Link layer
Front
What is the primary purpose of a subnet mask
Back
To divide an IP network into sub-networks for better organization
Front
What is the difference between IPv4 and IPv6 addressing
Back
IPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses
Front
What does DHCP stand for
Back
Dynamic Host Configuration Protocol
Front
What is the purpose of the ARP protocol
Back
To map IP addresses to MAC addresses
Front
What is the most common port for remote desktop protocol
Back
3389
Front
What does the Transport layer of the OSI model handle
Back
End-to-end communication, error correction, and flow control
Front
What is the purpose of a DMZ in network security
Back
To provide an additional layer of protection by isolating public-facing services
Front
What is the default subnet mask for a Class C IP address
Back
255.255.255.0
Front
What is the limitation of Telnet
Back
It sends data, including passwords, in plaintext making it insecure
Front
What type of device connects two different networks
Back
Router
Front
What is the primary use of Telnet
Back
To remotely access and manage devices over a network
Front
What is a Ping Sweep
Back
An ICMP-based method to identify active hosts on a network
Front
Name the seven layers of the OSI model
Back
Physical, Data Link, Network, Transport, Session, Presentation, Application
Front
Name a protocol that operates at the Presentation layer of the OSI model
Back
SSL/TLS
Front
Define a Packet
Back
A formatted unit of data used in networking for communication
Front
Which protocol is used for secure web traffic
Back
HTTPS
Front
What is the function of a Proxy server
Back
To act as an intermediary between clients and servers for requests
Front
At which OSI layer does IP addressing operate
Back
Network layer
Front
What is the primary function of ICMP
Back
To send error messages and operational information about IP-based communication
Front
What does DHCP do
Back
Automatically assigns IP addresses to devices on a network
Front
What is a VLAN
Back
Virtual Local Area Network
Front
What does a standard web proxy server filter
Back
HTTP and HTTPS traffic
Front
What is the primary function of DNS
Back
To translate domain names into IP addresses
Front
Which layer of the OSI model do firewalls typically operate on
Back
Network or Transport layer
Front
What type of network topology uses a single central connection point like a hub
Back
Star topology
1/45
This deck covers essential networking concepts, including protocols, OSI and TCP/IP models, network topologies, and types of network devices critical for ethical hacking.