Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Use the Internet to research each of the command-line tools found in Table 13-7. Select five of the tools and design a command line with

Use the Internet to research each of the command-line tools found in Table 13-7. Select five of the tools and design a command line with the appropriate options that could be used to investigate the security configuration or settings of a network or computer. Then run those command lines with the options, and capture the screen of results. Create a table that lists the tool, a description of the options that you used, and embed the screen capture into the document as an appendix.

image text in transcribed

Table 13-7 Operating system command-line tools Name Ping Netstat Tracert Nslookup Description How used Tests the connection between two Can flood the network to determine how network devices it responds to a Denial of Service attack Displays detailed information about Used to determine the source of how a device is communicating with malware that is sending out stolen other network devices information or communicating with a command and control server Shows the path that a packet takes Can detect faulty or malicious routing paths Queries the Domain Name System Used to verify correct DNS (DNS) to obtain a specific domain configurations name or IP address mapping Linux command-line alternative to More robust tool that can also verify Nslookup DNS configurations View and modify Address Resolution Can view ARP cache to uncover ARP Protocol (ARP) cache poisoning attack Displays all current TCP/IP network Used to alter current settings such as configuration values and refreshes IP address, subnet mask, and default Dynamic Host Configuration Protocol gateway to test if configurations are (DHCP) and DNS settings secure Linux implementations of Ipconfig Like Ipconfig, it can test to determine if configurations are secure. Linux command-line protocol analyzer Can monitor network traffic for unauthorized traffic Dig Arp Ipconfig IP and Ifconfig Tcpdump Table 13-7 Operating system command-line tools Name Ping Netstat Tracert Nslookup Description How used Tests the connection between two Can flood the network to determine how network devices it responds to a Denial of Service attack Displays detailed information about Used to determine the source of how a device is communicating with malware that is sending out stolen other network devices information or communicating with a command and control server Shows the path that a packet takes Can detect faulty or malicious routing paths Queries the Domain Name System Used to verify correct DNS (DNS) to obtain a specific domain configurations name or IP address mapping Linux command-line alternative to More robust tool that can also verify Nslookup DNS configurations View and modify Address Resolution Can view ARP cache to uncover ARP Protocol (ARP) cache poisoning attack Displays all current TCP/IP network Used to alter current settings such as configuration values and refreshes IP address, subnet mask, and default Dynamic Host Configuration Protocol gateway to test if configurations are (DHCP) and DNS settings secure Linux implementations of Ipconfig Like Ipconfig, it can test to determine if configurations are secure. Linux command-line protocol analyzer Can monitor network traffic for unauthorized traffic Dig Arp Ipconfig IP and Ifconfig Tcpdump

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions