Bash, the Crucial Exams Chat Bot
AI Bot

Networking Fundamentals (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

FrontBack
At which OSI layer does IP addressing operateNetwork layer
Define a PacketA formatted unit of data used in networking for communication
In the OSI modelat what layer does a switch operate,Data Link layer
Name a protocol that operates at the Presentation layer of the OSI modelSSL/TLS
Name one type of wireless network encryptionWPA2
Name the seven layers of the OSI modelPhysical, Data Link, Network, Transport, Session, Presentation, Application
What does a standard web proxy server filterHTTP and HTTPS traffic
What does ARP stand forAddress Resolution Protocol
What does CIDR stand forClassless Inter-Domain Routing
What does DHCP doAutomatically assigns IP addresses to devices on a network
What does DHCP stand forDynamic Host Configuration Protocol
What does NAT stand forNetwork Address Translation
What does TCP stand forTransmission Control Protocol
What does the Transport layer of the OSI model handleEnd-to-end communication, error correction, and flow control
What does VPN stand forVirtual Private Network
What is a key function of a VLANTo segment a network logically irrespective of physical topology
What is a MAC addressA unique hardware identifier assigned to a network interface card
What is a Ping SweepAn ICMP-based method to identify active hosts on a network
What is a VLANVirtual Local Area Network
What is an example of a Class A IP address10.0.0.1
What is the default subnet mask for a Class C IP address255.255.255.0
What is the difference between IPv4 and IPv6 addressingIPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses
What is the function of a Proxy serverTo act as an intermediary between clients and servers for requests
What is the function of the Transport layer in the TCP/IP modelDelivering data and ensuring its completeness
What is the limitation of TelnetIt sends data, including passwords, in plaintext making it insecure
What is the most common port for remote desktop protocol3389
What is the port number for HTTP80
What is the primary characteristic of a TCP connectionReliable and connection-oriented
What is the primary function of DNSTo translate domain names into IP addresses
What is the primary function of ICMPTo send error messages and operational information about IP-based communication
What is the primary purpose of a subnet maskTo divide an IP network into sub-networks for better organization
What is the primary use of TelnetTo remotely access and manage devices over a network
What is the purpose of a DMZ in network securityTo provide an additional layer of protection by isolating public-facing services
What is the purpose of NATTo allow multiple devices to share a single public IP address
What is the purpose of the ARP protocolTo map IP addresses to MAC addresses
What is the purpose of the OSI modelTo standardize networking frameworks and guide interoperability between systems
What is the role of a VPNTo securely connect networks and protect data in transit over the internet
What port does FTP use for control commands21
What protocol is a secure alternative to TelnetSSH (Secure Shell)
What protocol is used for fastconnectionless communication,UDP (User Datagram Protocol)
What type of device connects two different networksRouter
What type of network topology uses a single central connection point like a hubStar topology
Which device operates at the Physical layer of the OSI modelHub
Which layer of the OSI model do firewalls typically operate onNetwork or Transport layer
Which protocol is used for secure web trafficHTTPS
This deck covers essential networking concepts, including protocols, OSI and TCP/IP models, network topologies, and types of network devices critical for ethical hacking.
Share on...
Follow us on...