Answered step by step
Verified Expert Solution
Question
00
1 Approved Answer
Use the Internet to research each of the command-line tools found in Table 13-7. Select five of the tools and design a command line with
Use the Internet to research each of the command-line tools found in Table 13-7. Select five of the tools and design a command line with the appropriate options that could be used to investigate the security configuration or settings of a network or computer. Then run those command lines with the options, and capture the screen of results. Create a table that lists the tool, a description of the options that you used, and embed the screen capture into the document as an appendix.
Table 13-7 Operating system command-line tools Name Ping Netstat Tracert Nslookup Description How used Tests the connection between two Can flood the network to determine how network devices it responds to a Denial of Service attack Displays detailed information about Used to determine the source of how a device is communicating with malware that is sending out stolen other network devices information or communicating with a command and control server Shows the path that a packet takes Can detect faulty or malicious routing paths Queries the Domain Name System Used to verify correct DNS (DNS) to obtain a specific domain configurations name or IP address mapping Linux command-line alternative to More robust tool that can also verify Nslookup DNS configurations View and modify Address Resolution Can view ARP cache to uncover ARP Protocol (ARP) cache poisoning attack Displays all current TCP/IP network Used to alter current settings such as configuration values and refreshes IP address, subnet mask, and default Dynamic Host Configuration Protocol gateway to test if configurations are (DHCP) and DNS settings secure Linux implementations of Ipconfig Like Ipconfig, it can test to determine if configurations are secure. Linux command-line protocol analyzer Can monitor network traffic for unauthorized traffic Dig Arp Ipconfig IP and Ifconfig Tcpdump Table 13-7 Operating system command-line tools Name Ping Netstat Tracert Nslookup Description How used Tests the connection between two Can flood the network to determine how network devices it responds to a Denial of Service attack Displays detailed information about Used to determine the source of how a device is communicating with malware that is sending out stolen other network devices information or communicating with a command and control server Shows the path that a packet takes Can detect faulty or malicious routing paths Queries the Domain Name System Used to verify correct DNS (DNS) to obtain a specific domain configurations name or IP address mapping Linux command-line alternative to More robust tool that can also verify Nslookup DNS configurations View and modify Address Resolution Can view ARP cache to uncover ARP Protocol (ARP) cache poisoning attack Displays all current TCP/IP network Used to alter current settings such as configuration values and refreshes IP address, subnet mask, and default Dynamic Host Configuration Protocol gateway to test if configurations are (DHCP) and DNS settings secure Linux implementations of Ipconfig Like Ipconfig, it can test to determine if configurations are secure. Linux command-line protocol analyzer Can monitor network traffic for unauthorized traffic Dig Arp Ipconfig IP and Ifconfig TcpdumpStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started