Free Essay

Netstat

In:

Submitted By stretchnjax
Words 481
Pages 2
Chapter 2 Solutions

Review Questions

1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?

b. Port 110

2. On a Windows computer, what command can you enter to show all open ports being used?

a. Netstat

3. Which protocol uses UDP?

d. TFTP

4. Which protocol offers guaranteed delivery and is connection oriented?

c. TCP

5. TCP communication could be likened to which of the following?

d. Phone conversation

6. Which of the following protocols is connectionless? (Choose all that apply.)

a. UDP

b. IP

7. Which command verifies the existence of a node on a network?

a. Ping

8. FTP offers more security than TFTP. True or False?

True

9. List the three components of the TCP/IP three-way handshake.

SYN, SYN-ACK, and ACK

10. What protocol is used for reporting or informational purposes?

c. ICMP

11. List the six flags of a TCP packet.

SYN, ACK, PSH, URG, RST, FIN

12. A UDP packet is usually smaller than a TCP packet. True or False?

True

13. What port, other than port 110, is used to retrieve e-mail?

b. Port 143

14. What port does DNS use?

d. Port 53

15. What command is used to log on to a remote server, computer, or router?

c. Telnet

16. Which of the following is not a valid octal number?

c. 3482

17. The initial sequence number (ISN) is set at which step of the TCP three-way handshake?

d. 1 and 2

18. A Ping command initially uses which ICMP type code?

b. Type 8

19. “Destination Unreachable” is designated by which ICMP type code?

c. Type 3

20. What’s the hexadecimal equivalent of the binary number 1111 1111?

a. FF

Activities

Activity 2-4

1. Octal values are 4, 7, 5, 3, and 2.

2. Students should have written the binary number 101, which converts to the octal number 5 (1 + 0 + 4).

3. Use 111 000 000 in binary and 700 in octal.

4. Use 111 110 100 in binary and 764 in octal.

5. The calculation should be 777 - 020 = 757. Converting octal 757 gives the directory permissions rwxr-xrwx.

6. Students should have done the following to solve this problem:

Default permission: 666

umask 022

Result: 644

Permissions: rw-r--r--

Case Projects

Case Project 2-1: Determining the Services Running on a Network

Answers may vary. The memo should include the most obvious services that would be running on a corporate network. At the very least, the network would be running e-mail (POP3, IMAP4, SMTP) and Web services.

Case Project 2-2: Investigating Possible E-mail Fraud

Answers may vary. The memo should include the syntax for connecting to an e-mail server and sending an e-mail to another person, using a different From address.

Similar Documents

Premium Essay

Basic Commands in Linux and Windows

...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................

Words: 2543 - Pages: 11

Premium Essay

Itm301

...192.168.2.1 How many NIC cards do you have in your computer? 6 What is your MAC address (Physical address) of your fires NIC? 00-FF-A5-A5-F9-41 What is your MAC address (Physical address) of your second NIC? 64-27-37-68-CF-84 2. Ping 2 sites of your choice. What message did you get on the screen? 3. At command prompt type in HOSTNAME and then press enter. What is your computer’s NetBios Name (Host name). Rehana-PC 4. At command prompt : type in: Arp –a What are the physical Addresses (MAC addresses) registered in your ARP cache? 5. At command prompt type in: NETSTAT -a What does Netstat command and What type/s of information did you get by running the above command? Netstat commands the Active Connections and by running the command, the types of information received include the “Proto”, “Local Address”, “Foreign Address”, and “State”. 6. At command prompt type in tracert www.netscape.com a) What is netspace’s IP address [205.188.100.58] b) How many hops it took for your message to reach the netscape server It took 30 hops to reach the netscape server. 7. At command prompt type in tracert www.microsoft.com a) What is Microsoft’s IP address [65.55.57.27] b) Did your message reach Microsoft server? Why? Why not? No, my message did not reach the Microsoft Server because after...

Words: 269 - Pages: 2

Premium Essay

Studyguide for Nt1210 Mid Term

...1230 Client server Topics • Transmission Control Protocol (TCP)/Internet Protocol (IP) for Wired and Wireless Networks • The Open Systems Interconnections (OSI) Model • IP Addressing • Firewalls TCP/IP for Wired and Wireless Networks[1] TCP/IP is an open-standard communications protocol suite that is the standard for communicating on the Internet • TCP and IP (two different protocols) contain all the fundamental mechanisms needed to support any and all types of networked communications • TCP/IP was developed as part of the ARPAnet project in the 1960’s (the early development of the current Internet) • TCP/IP became a unifying and reliable element that enabled interoperability across incompatible systems • One of TCP/IP's most basic yet critical functions is its preparation of application data for transmission across a network. • TCP/IP accepts data of virtually any size from applications (typically in the form of a file) and chops it up into smaller, more manageable chunks called segments (segmentation) • In communicating, TCP handles flow control, IP handles addressing • Being a suite of different protocols, TCP/IP includes such protocols as DNS, DHCP, http, ftp, POP3, SMTP and TELNET. Other TCP protocols may be found at http://www.protocols.com/pbook/tcpip1.htm The Open Systems Interconnections (OSI) Model The most common way to illustrate the communication...

Words: 1931 - Pages: 8

Premium Essay

Linux

...Review Questions Chapter 6: Host Hardening 1. To know how to install an operating system with secure configuration options, you would use a... a. security baseline b. standard c. security template d. wizard 2. A systems administrator’s main role is to… a. manage a network b. implement security baseline on servers c. None of the above 3. In a Windows network, which of the following could be used to implement security measures on multiple computers through a domain? a. Policy Maker b. GPO c. Domain ACL 4. LINUX distributions are standardized which makes them easier to manage a. True b. False 5. Which of the following is true? a. A particular version of UNIX will offer multiple user interfaces. b. All UNIX user interfaces are command line interfaces c. Both of the above. d. Neither a. nor b. 6. UNIX command-line interfaces are called _____. a. versions b. distributions c. GUIs d. shells e. windows 7. Routers are sometimes hosts. a. True. b. False 8. Cisco’s operating system for its routers and most of its managed switches is... a. IOS b. UNIX c. LINUX d. Windows 9. To apply patches in Windows 2000 and later versions of Windows, you choose an option on the _______ menu. a...

Words: 445 - Pages: 2

Free Essay

Commands (Windows)

...10 Useful Windows Commands You Should Know…. There are some things you can only do from the command line, even on Windows. Some of these tools don’t have graphical equivalents, while others are just plain faster to use than their graphical interfaces. We can’t possibly cover all the useful commands you can use in the Command Prompt or PowerShell here. We’ll be focusing on commands that should be useful even if you’re not a command-line person. ipconfig – Quickly Find Your IP Address You can find your IP address from the Control Panel, but this takes quite a few clicks. The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway — useful if you want to know the IP address of your router’s web interface. To use the command, just type ipconfig into a Command Prompt window. You’ll see a list of all the network connections your computer is using. Look under Wireless LAN adapter if you’re connected to Wi-Fi or Ethernet adapter Local Area Connection if you’re connected to a wired network. ipconfig /flushdns – Flush Your DNS Resolver Cache If you change your DNS server, the effects won’t necessarily take place immediately. Windows uses a cache that remembers DNS responses it’s received, saving time when you access the same addresses again in the future. To ensure Windows is getting addresses from the new DNS servers instead of using old, cached entries, run the ipconfig /flushdns command after...

Words: 1063 - Pages: 5

Premium Essay

Info Sec

...run both simultaneously. 2. IIS manager, web (HTTP), and FTP services may already be installed, but the following steps will help verify. 3. Navigate to the Control Panel / Programs and Features / Turn Windows Features On or Off / Internet Information Services. Select the proper selection for FTP service, IIS management console, world wide web services. 4. After installation, verify that you have the Internet Information Services (IIS) Manager under Administrative Tools. The web and FTP services can be managed from here. It may be necessary to add FTP publishing to enable the FTP service. (This is done in the below steps). [pic] 5. Also verify that the web and FTP server are running. Open a command prompt and type netstat -ban. You should see that the IIS web server is listening under TCP port __80________ and the FTP server is listening under TCP port _21_________. NOTE: You may not see the FTP service running yet. It may not be set up. We will complete that task below. 6. Let's see if we can get to the default web page served from your IIS web server. Open your web browser and type in http://_iisstart.htm_________________________ Briefly describe the web page you see. Internet information services webpage default ________________________________________ ________________________________________________________________________ Can your...

Words: 782 - Pages: 4

Free Essay

Hacking Technologies Midterm Study Guide

...Mid-term Exam Unit 1 Questions: 1. Explain the Morris Worm and its significance. It is considered to be the first Internet Worm. It was designed to count the number of systems connected to the Internet, however due to a flaw the worm replicated quickly and caused widespread slowdown across the globe. 2. Explain what____ hackers are. White-Hat- Those that know how hacking works but use skills for good Black-Hat – Those that through actions or stated intent, indicated that their hacking is designed to break the law, disrupt systems or businesses, or generate an illegal return Grey-Hat – Rehabilitated hackers or those that once were on the (black-hat) dark side but are now reformed, not all people will trust a grey-hat hacker 3. What is ECPA and what does it regulate? The Electronic Communications Privacy Act it prohibits eavesdropping or the interception of message contents without distinguishing between private or public systems 4. What is SOX and what does it regulate? It is the Sarbanes-Oxley Act and it generates laws that affect public corporations financial reporting. Under SOX corps must certify the accuracy and integrity of financial reporting and accounting 5. What is the main motivation for hackers today and what was the previous motivation for earlier generations of hackers? Today’s hackers are motivated by greed or money some for status/terrorism/revenge and some for fun. Early hackers were in it for the curiosity. However also today...

Words: 3888 - Pages: 16

Premium Essay

Nt1210 Lab 5.3

...what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 192.168.1.1. From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT 192.168.1.1. It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped...

Words: 256 - Pages: 2

Premium Essay

Nt1210 Intro to Networking Lab 5.3

...NT1210 Lab 5.3 Finding Network Settings Exercise 5.3.1 For this exercise, you will release your IP address using ipconfig. This is a beneficial tool for troubleshooting your own local network and correcting any problems with the assignment of IP addresses. This exercise requires that you have DHCP in use for assigning IP addresses, which is a typical default setting. To begin, you should type the command ipconfig at the command-line interface and press Enter. Record the information it presents for the IP address and default gateway; you can ignore the rest of the information for now. When you have completed this, type the following command to release the IP address: Ipconfig /release To renew your lease on the IP address for your network card or adapter, you will use the following command: Ipconfig /renew This will create a new lease on an IP address for your network card or adapter. When the command to renew the IP address is complete, you should compare the result to the initial run of ipconfig and compare the results. Are the entries the same for the IP address and for the default gateway. Exercise 5.3.2 You can use the ping command on your local machine. This does not send traffic out onto the network, but it is an effective means of making sure that your network adapter is functional. To ping the local host, use the following command: Ping localhost What address is returned as the IP address of localhost? How many times is the ping message sent by default...

Words: 861 - Pages: 4

Premium Essay

Is4560

...Asymmetric Encryption Encryption that uses two keys: if you encrypt with one you may decrypt with the other MD5 Message Digest 5. A hashing funciton used to provide integrity. MD5 uses 128 bits. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained. IPSec 1) Set of protocols developed to support the secure exchange of packets IPv4 and IPv6 2) Operates at a low level in the OSI model (Layer 3) 3) Transparent security protocol for applications, users, and software OSI Model 7.Application 6.Presentation 5.Session 4.Transport 3.Network 2.Data 1.Physical OSI Model Layer 3-Network Handles the logical addressing and routing of traffic. First layer implemented within the software being used, specifically the OS. white-hat hacker security experts paid to find security holes in a system Black-hat hacker takes advantage of security vulnerabilities to gain unlawful access to private networks for personal gain Gray Hat Hackers Hackers in this class are “rehabilitated” hackers or those who once were on the “dark side" but are now reformed. For obvious reasons, not all people will trust a gray-hathacker. Ex: Kevin Mitnick Script kiddie An amateur hacker you lacks sophisticated computer skills. These are usually teenagers that don't use programs to hack into computer systems, instead use tools made by skilled hackers that...

Words: 1515 - Pages: 7

Premium Essay

It220

...How many bits are in a gigabyte? 1 billion How many bits are in a megabyte? 1 million Convert 00101010 to decimal. 42 What is the difference between a sector and a track? A sector is part of a track How many bits are in one hexadecimal digit? 4 How are voice communications converted to digital signals? Audio is sampled at a high rate which is converted to binary numbers What does it mean to compress a video file? To decrease file size In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? web page: page2 server: www.example.com protocol: http What makes up the internet core? Many separate small and large networks What manages computer peripherals devices? Device Drivers What physical network topology has the inherent weakness of a single point failure? Star Network What is a networking standard? Details of what a networking technology does, and how it does it What is a de facto standard and what stanards-setting body creates them? An informal standard, no company governs them What are some reasons TCP/IP model is divided into layers? Troubleshooting, Creation of network standards and protocols Why is the TCP/IP model considered an "open" networking model? It's not owned by any specific organization what do routers in a network do? Mave data between LANs by linking them to WANs What is encapsulation? A way to cross data over a any network link In a...

Words: 745 - Pages: 3

Premium Essay

It220

...ITT Networking Standards & Protocols Midterm | Term First     Both Sides How many bits are in a gigabyte?1 billion | Click to flip | | 50 terms Terms | Definitions | How many bits are in a gigabyte? | 1 billion | How many bits are in a megabyte? | 1 million | Convert 00101010 to decimal. | 42 | What is the difference between a sector and a track? | A sector is part of a track | How many bits are in one hexadecimal digit? | 4 | How are voice communications converted to digital signals? | Audio is sampled at a high rate which is converted to binary numbers | What does it mean to compress a video file? | To decrease file size | In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? | web page: page2 server: www.example.com protocol: http | What makes up the internet core? | Many separate small and large networks | What manages computer peripherals devices? | Device Drivers | What physical network topology has the inherent weakness of a single point failure? | Star Network | What is a networking standard? | Details of what a networking technology does, and how it does it | What is a de facto standard and what stanards-setting body creates them? | An informal standard, no company governs them | What are some reasons TCP/IP model is divided into layers? | Troubleshooting, Creation of network standards and protocols | Why is the TCP/IP model considered an "open"...

Words: 772 - Pages: 4

Free Essay

Unit 5 Lab 5.1-5.4

...Unit 5. LAB 5 Ethernet LANs LAB 5.1: LAN Standard Exercise 5.1.1 Briefly define the 802.1 standard: Keeper of the LAN architecture – IEEE standard 802. Describes the 802 family of standards. Describes the LAN Architecture. Defines some useful things, such as the LAN address format, the SNAP protocol, the Playpen Ethertypes, and the OID registration arcs. The higher Layer Interface working group in 802. Defines the bridging and security glue that interconnects the LANs define by the 802 MAC groups. Exercise 5.1.2 What 802.3 standard originally define PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? The standard that originally defines PoE functionality was the IEEE 802.3af. The new standard is known as IEEE 802.3at it, and it was enhanced in 2012. Exercise 5.1.3 Complete Table Standard | Cabling | Maximum Length | 10BASE5 | Coaxial(Thicknet) | 500m | 10BASE2 | Coaxial (Thinnet) | 185m | 10BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-FX | Multi-mode fiber optic cable (SC or ST) | 400m | 100BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-T4 | STP Twisted Cable | 100m | 100BASE-TX | Single-mode fiber optic cable | 20km | 1000BASE-LX | SMF and MMF | 550m | 1000BASE-SX | MM fiber-optic | 220m or 550m (dependent upon fiber thickness | 1000BASE-ZX | MM fiber-optic | 550m | 1000BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | Exercise 5.1.4 What does the numeric prefix before BASE in the Ethernet...

Words: 1936 - Pages: 8

Premium Essay

Best Practices for Network Troubleshooting

...Best Practices for Network Troubleshooting Valance Baltimore NTC/405 July 27, 2015 Bradley Rush Best Practices for Network Troubleshooting The article that I found is titled Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know (2011). This article list ten basic troubleshooting tips that could help an IT professional determine the reason for a failed network connection. Let’s start with the most commonly used network tool, Ping. The Ping utility is used to provide a connectivity test between the requesting host and the destination host. Ping is done through the Internet Control Message Protocol (ICMP), by sending an echo packet to a destination host and then listens for a response from that host. This utility is used to help determine where the connection problem may be, in the office or within the network provider’s network. After the Ping utility has been performed to determine the basic connectivity, and then typically the next step would be the tracert/traceroute utility is used. This utility can determine the path to the destination host and the route the packet takes to get there, and the response time of the intermediate host. Tracert is window based and traceroute is Linux based. According to Wilkins (2011) one of the most important things that must be completed when troubleshooting a network is to find out the specific IP configuration of the affected hosts. If the address is configured statically you may already know this information, but...

Words: 541 - Pages: 3

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise 5.4.4 If your local machine (node A) is not connecting to any other hosts on the network, what two commands will give you information on whether your network device is active and the current configuration of your NIC or adapter? Type Netstat into CMD and...

Words: 344 - Pages: 2