Bash, the Crucial Exams Chat Bot
AI Bot
Networking Fundamentals (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards
| Front | Back |
| At which OSI layer does IP addressing operate | Network layer |
| Define a Packet | A formatted unit of data used in networking for communication |
| In the OSI model | at what layer does a switch operate,Data Link layer |
| Name a protocol that operates at the Presentation layer of the OSI model | SSL/TLS |
| Name one type of wireless network encryption | WPA2 |
| Name the seven layers of the OSI model | Physical, Data Link, Network, Transport, Session, Presentation, Application |
| What does a standard web proxy server filter | HTTP and HTTPS traffic |
| What does ARP stand for | Address Resolution Protocol |
| What does CIDR stand for | Classless Inter-Domain Routing |
| What does DHCP do | Automatically assigns IP addresses to devices on a network |
| What does DHCP stand for | Dynamic Host Configuration Protocol |
| What does NAT stand for | Network Address Translation |
| What does TCP stand for | Transmission Control Protocol |
| What does the Transport layer of the OSI model handle | End-to-end communication, error correction, and flow control |
| What does VPN stand for | Virtual Private Network |
| What is a key function of a VLAN | To segment a network logically irrespective of physical topology |
| What is a MAC address | A unique hardware identifier assigned to a network interface card |
| What is a Ping Sweep | An ICMP-based method to identify active hosts on a network |
| What is a VLAN | Virtual Local Area Network |
| What is an example of a Class A IP address | 10.0.0.1 |
| What is the default subnet mask for a Class C IP address | 255.255.255.0 |
| What is the difference between IPv4 and IPv6 addressing | IPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses |
| What is the function of a Proxy server | To act as an intermediary between clients and servers for requests |
| What is the function of the Transport layer in the TCP/IP model | Delivering data and ensuring its completeness |
| What is the limitation of Telnet | It sends data, including passwords, in plaintext making it insecure |
| What is the most common port for remote desktop protocol | 3389 |
| What is the port number for HTTP | 80 |
| What is the primary characteristic of a TCP connection | Reliable and connection-oriented |
| What is the primary function of DNS | To translate domain names into IP addresses |
| What is the primary function of ICMP | To send error messages and operational information about IP-based communication |
| What is the primary purpose of a subnet mask | To divide an IP network into sub-networks for better organization |
| What is the primary use of Telnet | To remotely access and manage devices over a network |
| What is the purpose of a DMZ in network security | To provide an additional layer of protection by isolating public-facing services |
| What is the purpose of NAT | To allow multiple devices to share a single public IP address |
| What is the purpose of the ARP protocol | To map IP addresses to MAC addresses |
| What is the purpose of the OSI model | To standardize networking frameworks and guide interoperability between systems |
| What is the role of a VPN | To securely connect networks and protect data in transit over the internet |
| What port does FTP use for control commands | 21 |
| What protocol is a secure alternative to Telnet | SSH (Secure Shell) |
| What protocol is used for fast | connectionless communication,UDP (User Datagram Protocol) |
| What type of device connects two different networks | Router |
| What type of network topology uses a single central connection point like a hub | Star topology |
| Which device operates at the Physical layer of the OSI model | Hub |
| Which layer of the OSI model do firewalls typically operate on | Network or Transport layer |
| Which protocol is used for secure web traffic | HTTPS |
This deck covers essential networking concepts, including protocols, OSI and TCP/IP models, network topologies, and types of network devices critical for ethical hacking.