Chapter 2 Solutions Review Questions 1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using? b. Port 110 2. On a Windows computer, what command can you enter to show all open ports being used? a. Netstat 3. Which protocol uses UDP? d. TFTP 4. Which protocol offers guaranteed delivery and is connection oriented? c. TCP 5. TCP communication could be likened
Words: 481 - Pages: 2
LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling
Words: 2543 - Pages: 11
Rehana-PC 4. At command prompt : type in: Arp –a What are the physical Addresses (MAC addresses) registered in your ARP cache? 5. At command prompt type in: NETSTAT -a What does Netstat command and What type/s of information did you get by running the above command? Netstat commands the Active Connections and by running the command, the types of information received include the “Proto”, “Local Address”, “Foreign Address”, and “State”. 6. At command
Words: 269 - Pages: 2
1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to
Words: 1931 - Pages: 8
Review Questions Chapter 6: Host Hardening 1. To know how to install an operating system with secure configuration options, you would use a... a. security baseline b. standard c. security template d. wizard 2. A systems administrator’s main role is to… a. manage a network b. implement security baseline on servers c. None of the above 3. In a Windows network, which of the following could be used to implement security
Words: 445 - Pages: 2
10 Useful Windows Commands You Should Know…. There are some things you can only do from the command line, even on Windows. Some of these tools don’t have graphical equivalents, while others are just plain faster to use than their graphical interfaces. We can’t possibly cover all the useful commands you can use in the Command Prompt or PowerShell here. We’ll be focusing on commands that should be useful even if you’re not a command-line person. ipconfig – Quickly Find Your IP Address You can
Words: 1063 - Pages: 5
services can be managed from here. It may be necessary to add FTP publishing to enable the FTP service. (This is done in the below steps). [pic] 5. Also verify that the web and FTP server are running. Open a command prompt and type netstat -ban. You should see that the IIS web server is listening under TCP port __80________ and the FTP server is listening under TCP port _21_________. NOTE: You may not see the FTP service running yet. It may not be set up. We will complete that
Words: 782 - Pages: 4
Mid-term Exam Unit 1 Questions: 1. Explain the Morris Worm and its significance. It is considered to be the first Internet Worm. It was designed to count the number of systems connected to the Internet, however due to a flaw the worm replicated quickly and caused widespread slowdown across the globe. 2. Explain what____ hackers are. White-Hat- Those that know how hacking works but use skills for good Black-Hat – Those that through actions or stated intent, indicated that their hacking
Words: 3888 - Pages: 16
trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped
Words: 256 - Pages: 2
NT1210 Lab 5.3 Finding Network Settings Exercise 5.3.1 For this exercise, you will release your IP address using ipconfig. This is a beneficial tool for troubleshooting your own local network and correcting any problems with the assignment of IP addresses. This exercise requires that you have DHCP in use for assigning IP addresses, which is a typical default setting. To begin, you should type the command ipconfig at the command-line interface and press Enter. Record the information it presents
Words: 861 - Pages: 4