-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CEH v10 Certified Ethical Hacker Study Guide
By :
THE FOLLOWING CEH EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Networking technologies
Communications protocols
Telecommunications technologies
Network topologies
Subnetting
While it may not look like there are a lot of topics that are covered in the exam in this chapter, what is covered is foundational for much of what comes later. After all, unless you are sitting at the computer you are attacking, which would be very uncommon, you’re going to be interacting with the network. In some cases, the different attacks, and certainly the defenses, will make use of networking technologies and communications protocols.
To understand how networks function, it may be helpful to have a conceptual understanding of how the protocols fit together. There is one conceptual model used to describe communications protocols and their functions. There is another way of describing these functions, sometimes called a...
Change the font size
Change margin width
Change background colour