Fundamentals Flashcards

(51 cards)

1
Q

Question: What is the main purpose of Snort?

A

Answer: To detect network intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question: What command is used to display the entire contents of a text

A

Answer: cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question: What command is used to display the first 10 lines of

A

Answer: head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question: How can you display a specific number of lines using the head command?

A

Answer: head -20 /etc/snort/snort.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question: What command is used to display the last lines of a file?

A

Answer: tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question: What is the purpose of the tail command?

A

Answer: Display the last lines of a file, for viewing the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question: What is the command used to download Snort if it is not preinstalled on the version of Kali Linux you are using?

A

Answer: apt-get install snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question: In which folder is the Snort config file located?

A

Answer: /etc/snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question: What is the name of the Snort config file?

A

Answer: snort.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question: What command is used to examine and interact with active network interfaces?

A

Answer: The ifconfig command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question: What does the ifconfig command show when entered into the terminal?

A

Answer: Information about the active network interfaces on the system, such as the name of the interface, the type of network being used, the IP address assigned to that network interface, the broadcast address, the network mask, and other technical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question: What does the ethe in the output from ifconfig refer to?

A

Answer: The first wired network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question: What is the purpose of the MAC address in the iconfig output?

A

Answer: The globally unique address stamped on every piece of network hardware, such as the network interface card (NIC) also referred as the Media Access Control address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: What is the inet addr in the ifconfig output?

A

Answer: The IP address currently assigned to that network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question: What is the Bcast in the ifconfig output?

A

Answer: The broadcast address, which is the address used to send out information to all IPs on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question: What is the Mask in the ifconfig output?

A

Answer: The network mask, which is used to determine what part of the IP address is connected to the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Question: What is the lo in the iconfig output?

A

Answer: The Loopback address, also called localhost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question: What is the purpose of the loopback address?

A

Answer: To test something on your system, such as your own web server, it is generally represented with the IP address 127.0.0.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question: What command is used to gather information on wireless adapters?

A

Answer: The iwconfig command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Question: What information can you glean from the iwconfig command?

A

Answer: The adapter’s IP address, its MAC address, what mode it’s in, the wireless standards it supports, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Question: What is the purpose of the promiscuous mode when using iwconfig command?

A

Answer: To enable wireless password cracking.

22
Q

Question: What is the purpose of spoofing a MAC address?

A

Answer: To neutralize security measures and bypass network access controls.

23
Q

Question: What command is used to take down the inter ace before changing the MAC address?

A

Answer: “ifconfig ethe down”

24
Q

Question: What command is used to change the MAC addre is?

A

Answer: “ifconfig ethe hw ether 00:11:22:33:44:55”

25
Question: What command is used to bring the interfice back up after changing the MAC address?
Answer: "ifconfig etho up"
26
Question: What is the DHCP server in inux and what does it do?
Answer: A daemon called dhed that assigns IP addresses to all systems on the subnet and keeps log files of which IP address is allocated to which machine at any one time.
27
Question: What command is used to request an IP address from DHCP?
Answer: "dhclient etho"
28
Question: What command is used to check the IP address configuration?
Answer: "¡fconfig*
29
Question:What is the purpose of the dig command?
Answer: To gather DNS information about a target domain.
30
Question: What type of information can you obtain by using the ns option with dig?
Answer: The IP address of the target's nameserver.
31
Question: What type of information can you obtain by using the mx option with dig?
Answer: Information on the email servers connected to a domain.
32
Question: What is the Berkeley Internet Name Domain (BIND)?
Answer: The most common Linux DNS server.
33
Question: How can you change your DNS server?
Answer: By editing the plaintext file /etc/resolv.conf in a text editor, or by using the command line by entering "echo "nameserver 8.8.8.8"> /etc/resolv.conf"
34
Question: What is the purpose of DNS?
Answer: Translate a domain name to the appropriate IP address; that way, your system knows how to get to it.
35
Question: How does dig Command could be used in reconnaissance phase?
Answer: You can use dig command to gather information about target domain such as IP address of the target's nameserver, email server, and potentially any subdomains and IP addresses.
36
Question: What is the default software manager for Debian-based Linux distributions, such as Kali and Ubuntu?
Answer: The Advanced Packaging Tool (apt)
37
Question: What is the primary command of apt?
Answer: apt-get
38
Question: What command can be used to check whether a package is available in the repository before downloading it?
Answer: apt-cache search keyword
39
Question: How do you install a piece of software from the default repository using apt-get?
Answer: apt-get install packagename
40
Question: How do you remove a piece of software using apt-get?
Answer: apt-get remove packagename
41
Question: If you want to remove the configuration files of a package ¡along with the package, what option should you use with apt-get?
Answer: purge
42
Question: What does the command apt-cache search keyword do?
Answer: it search the apt cache and returns package names that contain the keyword in it
43
Question: What does the command apt-get install packagename do?
Answer: it downloads and installs the package "packagename"
44
Question: What does the command apt-get remove packagename do?
Answer: it remove the package "packagename" from the system
45
Question: What does the command apt-get purge packagename do?
Answer: it resoves the package "packagenane" along with its configuration files from the system.
46
Question: What command do you use to update your individual system?
Answer: apt-get update
47
Question: What is the difference between updating and upgrading?
Answer: Updating updates the list of packages available for download from the repository. Whereas upgrading will upgrade the package to the latest version in the repository.
48
Question: What command do you use to upgrade existing packages on your system?
Answer: apt-get upgrade
49
Question: What is the difference between repositories and sources.list file?
Answer: Repositories are servers that hold software for particular distributions of Linux. The sources.list file is where the repositories your system will search for software are stored.
50
Question: Why is it important to add a backup repository?
Answer: It is important to add a backup repository because it allows your system to search through it in case it doesn't find a specific software in the main repository.
51
Question: What happens when you enter the command apt-get upgrade?
Answer: apt-get upgrade upgrades every package on your system that apt knows about, meaning only those stored in the reposi It also estimates the amount of hard drive space necessary for the software package and prompts you to confirm whether you want to continue with the upgrade.