cybersec+ section 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Why do security professionals prefer the Command-Line Interface (CLI) over a Graphical User Interface (GUI)?

The CLI provides deeper, scriptable, and automated control. GUIs only expose a limited set of options determined by the developer.

2
New cards

What is the difference between a shell and a terminal?

A terminal is the program that provides the window and interface. The shell is the command interpreter that runs within the terminal and executes commands (e.g., PowerShell, bash).

3
New cards

What are the two primary command-line shells on modern Windows systems?

cmd.exe (legacy Command Prompt) and PowerShell (modern, object-oriented).

4
New cards

What is the most common shell found on Linux and macOS systems?

bash (Bourne-Again Shell). It is a POSIX-compliant shell.

5
New cards

What is the industry standard for secure, authenticated, and encrypted remote CLI access?

Secure Shell (SSH). It is a critical secure protocol to know versus insecure methods like Telnet.

6
New cards

What is the primary purpose of the ping command?

To test Layer 3 (IP) network connectivity and verify that the remote host's firewall allows ICMP traffic.

7
New cards

How does the default behavior of ping differ between Windows and Linux/macOS?

Windows: Sends 4 ICMP echo requests and stops. Linux/macOS: Pings continuously until stopped (Ctrl-C).

8
New cards

How can you use ping to test DNS resolution?

Ping a Fully Qualified Domain Name (FQDN) like ping www.google.com. The first line of the output will show the name being resolved to an IP address, which confirms DNS is working.

9
New cards

What Windows command displays the IPv4/IPv6 address, subnet mask, and default gateway for all network adapters?

ipconfig.

10
New cards

Which Windows command reveals the physical (MAC) address and DHCP lease information?

ipconfig /all.

11
New cards

A Windows machine has an outdated DNS record and cannot browse a site that recently changed its IP. Which command would clear the local DNS resolver cache?

ipconfig /flushdns.

12
New cards

You suspect a duplicate IP address on the network. Which two ipconfig commands can you run in sequence to get a fresh IP lease from the DHCP server?

ipconfig /release and ipconfig /renew.

13
New cards

What is the legacy command on Linux for viewing network configuration, and what modern command is replacing it?

Legacy: ifconfig; Modern: ip (e.g., ip addr).

14
New cards

An exam question shows a screenshot of ping -t 8.8.8.8 running endlessly. Which operating system is depicted?

Windows. The -t switch creates a continuous ping on Windows.

15
New cards

You can resolve a hostname, but your pings result in 'Request timed out.' What is the most likely cause?

A firewall is blocking ICMP packets.

16
New cards

Which two pieces of information from ipconfig are essential to confirm that your host can route traffic to another subnet?

IPv4 Address (your address) and Default Gateway (the router's address).

17
New cards

Why do security professionals prefer the Command-Line Interface (CLI) over a Graphical User Interface (GUI)?

The CLI provides deeper, scriptable, and automated control. GUIs only expose a limited set of options determined by the developer.

18
New cards

What is the difference between a shell and a terminal?

A terminal is the program that provides the window and interface. The shell is the command interpreter that runs within the terminal and executes commands (e.g., PowerShell, bash).

19
New cards

What are the two primary command-line shells on modern Windows systems?

cmd.exe (legacy Command Prompt) and PowerShell (modern, object-oriented).

20
New cards

What is the most common shell found on Linux and macOS systems?

bash (Bourne-Again Shell). It is a POSIX-compliant shell.

21
New cards

What is the industry standard for secure, authenticated, and encrypted remote CLI access?

Secure Shell (SSH). It is a critical secure protocol to know versus insecure methods like Telnet.

22
New cards

What is the primary purpose of the ping command?

To test Layer 3 (IP) network connectivity and verify that the remote host's firewall allows ICMP traffic.

23
New cards

How does the default behavior of ping differ between Windows and Linux/macOS?

Windows: Sends 4 ICMP echo requests and stops. Linux/macOS: Pings continuously until stopped (Ctrl-C).

24
New cards

How can you use ping to test DNS resolution?

Ping a Fully Qualified Domain Name (FQDN) like ping www.google.com. The first line of the output will show the name being resolved to an IP address, which confirms DNS is working.

25
New cards

What Windows command displays the IPv4/IPv6 address, subnet mask, and default gateway for all network adapters?

ipconfig.

26
New cards

Which Windows command reveals the physical (MAC) address and DHCP lease information?

ipconfig /all.

27
New cards

A Windows machine has an outdated DNS record and cannot browse a site that recently changed its IP. Which command would clear the local DNS resolver cache?

ipconfig /flushdns.

28
New cards

You suspect a duplicate IP address on the network. Which two ipconfig commands can you run in sequence to get a fresh IP lease from the DHCP server?

ipconfig /release and ipconfig /renew.

29
New cards

What is the legacy command on Linux for viewing network configuration, and what modern command is replacing it?

Legacy: ifconfig; Modern: ip (e.g., ip addr).

30
New cards

An exam question shows a screenshot of ping -t 8.8.8.8 running endlessly. Which

Windows. The -t switch creates a continuous ping on Windows.