Level 30 Level 32
Level 31

436 - 450


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Administrators can also limit the ways in which users can access systems by
Set logon constraints based on the
Cybersecurity professionals often use
Command line tools as part of their security routine
ten popular command line tools for cybersecurity
Nmap, Metasploit, Aircrack-ng, Snort, Netstat, Tcpdump,
Nmap
Network port scanner and service detector
Metasploit
Penetration testing software
Aircrack-ng
802.11 WEP and WPA-PSK keys cracking program
Netstat
Displays detailed network status information
Tcpdump
Command line packet analyzer
John the Ripper
Password cracker
Kismet
02.11 layer 2 wireless network detector, sniffer and IDS
OpenSSH/PuTTY/SSH
Program for logging into or executing commands on a remote machine
Netcat
Networking utility that reads and writes data across network connections, using the TCP/IP protocol
Snort
Open source IDS/IPS
Logging
Provides the basic data required to monitor and detect unauthorized activity and to analyze potential
Most operating systems have a wide range of events and transactions that can be
Recorded and stored for