Fundamentals Flashcards
(51 cards)
Question: What is the main purpose of Snort?
Answer: To detect network intrusions.
Question: What command is used to display the entire contents of a text
Answer: cat
Question: What command is used to display the first 10 lines of
Answer: head
Question: How can you display a specific number of lines using the head command?
Answer: head -20 /etc/snort/snort.conf
Question: What command is used to display the last lines of a file?
Answer: tail
Question: What is the purpose of the tail command?
Answer: Display the last lines of a file, for viewing the
Question: What is the command used to download Snort if it is not preinstalled on the version of Kali Linux you are using?
Answer: apt-get install snort
Question: In which folder is the Snort config file located?
Answer: /etc/snort
Question: What is the name of the Snort config file?
Answer: snort.conf
Question: What command is used to examine and interact with active network interfaces?
Answer: The ifconfig command.
Question: What does the ifconfig command show when entered into the terminal?
Answer: Information about the active network interfaces on the system, such as the name of the interface, the type of network being used, the IP address assigned to that network interface, the broadcast address, the network mask, and other technical information.
Question: What does the ethe in the output from ifconfig refer to?
Answer: The first wired network connection
Question: What is the purpose of the MAC address in the iconfig output?
Answer: The globally unique address stamped on every piece of network hardware, such as the network interface card (NIC) also referred as the Media Access Control address.
Question: What is the inet addr in the ifconfig output?
Answer: The IP address currently assigned to that network interface.
Question: What is the Bcast in the ifconfig output?
Answer: The broadcast address, which is the address used to send out information to all IPs on the subnet.
Question: What is the Mask in the ifconfig output?
Answer: The network mask, which is used to determine what part of the IP address is connected to the local network.
Question: What is the lo in the iconfig output?
Answer: The Loopback address, also called localhost.
Question: What is the purpose of the loopback address?
Answer: To test something on your system, such as your own web server, it is generally represented with the IP address 127.0.0.1.
Question: What command is used to gather information on wireless adapters?
Answer: The iwconfig command.
Question: What information can you glean from the iwconfig command?
Answer: The adapter’s IP address, its MAC address, what mode it’s in, the wireless standards it supports, and more.
Question: What is the purpose of the promiscuous mode when using iwconfig command?
Answer: To enable wireless password cracking.
Question: What is the purpose of spoofing a MAC address?
Answer: To neutralize security measures and bypass network access controls.
Question: What command is used to take down the inter ace before changing the MAC address?
Answer: “ifconfig ethe down”
Question: What command is used to change the MAC addre is?
Answer: “ifconfig ethe hw ether 00:11:22:33:44:55”