Network Commands Flashcards

1
Q

ping

A

sends Internet Control Message Protocol (ICMP) echo request to host and listens for reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

traceroute/tracert

A

Traces the route of a packet to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tracepath

A

similar to traceroute, but can be used by all users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ipconfig

A

provides user with IP, subnet mask, and default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ifconfig

A

configures kernel network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARP

A

Address Resolution Protocol. Displays IP to physical (MAC) address mappings for hosts in the cache. Host must be on local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

netstat

A

Network statistics. Displays info about active ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

nslookup

A

Name Server Lookup. Displays DNS and IP address mappings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dig

A

Domain Information Groper. Query DNS name servers. Replaced nslookup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whois

A

used to lookup who owns domain or block of IP addresses. Can be hidden with privacy options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

route

A

Displays current route tables on host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

scp

A

Secure Copy Protocol. Securely copies files between servers. Uses SSH for authentication and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ftp

A

File Transfer Protocol. Data is unencrypted. Copies files from one host to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

finger

A

displays info about user on remote system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

nmap

A

Network Mapper. Scans networks to find hosts and open ports. Finds what is deployed on network for vulnerability analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

telnet/ssh

A

Allows user to manage accounts. SSH is encrypted, telnet is not.