System ports run from 0 to 1023.
System ports run from 0 to 1023.
User ports run from 1024 to 49151.
User ports run from 1024 to 49151.
Dynamic and private ports run from 49152 to 65535.
Dynamic and private ports run from 49152 to 65535.
TCP 22 (SSH) provides secure remote shell access when keys and passwords are handled correctly.
TCP 22 (SSH) provides secure remote shell access when keys and passwords are handled correctly.
TCP 23 (Telnet) is unsecure and should be avoided for remote management.
TCP 23 (Telnet) is unsecure and should be avoided for remote management.
TCP 80 (HTTP) is unencrypted and should be replaced by HTTPS where possible.
TCP 80 (HTTP) is unencrypted and should be replaced by HTTPS where possible.
TCP 443 (HTTPS) secures and encrypts data between the user's browser and a website via TLS.
TCP 443 (HTTPS) secures and encrypts data between the user's browser and a website via TLS.
UDP/TCP 53 runs DNS and is vulnerable to DDoS attacks; DNSSEC provides integrity but not confidentiality.
UDP/TCP 53 runs DNS and is vulnerable to DDoS attacks; DNSSEC provides integrity but not confidentiality.
TCP 445 (SMB) should not be open to the public because it allows file and printer sharing over the network.
TCP 445 (SMB) should not be open to the public because it allows file and printer sharing over the network.
Use encrypted ports like 995 for POP3S and 993 for IMAPS instead of their unsecured counterparts.
Use encrypted ports like 995 for POP3S and 993 for IMAPS instead of their unsecured counterparts.
The chmod command allows users to change file and directory permissions with syntax: chmod <operations> <file/directory name>.
The chmod command allows users to change file and directory permissions with syntax: chmod <operations> <file/directory name>.
IEEE 802 standards such as 802.1X and 802.1D define important network access control and bridging behaviors.
IEEE 802 standards such as 802.1X and 802.1D define important network access control and bridging behaviors.
chmod +r sample.txt -> adds read permissions to the sample.txt file
chmod +r sample.txt -> adds read permissions to the sample.txt file
chown changes file ownership
chown changes file ownership
chgrp changes group ownership
chgrp changes group ownership
ls lists a directory's content
ls lists a directory's content
ps reports a snapshot of the current processes
ps reports a snapshot of the current processes
pwd shows the current working directory's path
pwd shows the current working directory's path
cd changes the shell working directory
cd changes the shell working directory
cp copies a file or directory
cp copies a file or directory
mv moves files or directories from one directory to another
mv moves files or directories from one directory to another
rm removes files, directories, device nodes and symbolic links
rm removes files, directories, device nodes and symbolic links
sudo executes commands with administrative privileges
sudo executes commands with administrative privileges
Numeric chmod 7 means read, write and execute permissions
Numeric chmod 7 means read, write and execute permissions
Numeric chmod 6 means read and write permissions
Numeric chmod 6 means read and write permissions
Numeric chmod 5 means read and execute permissions
Numeric chmod 5 means read and execute permissions
IEEE 802 is a collection of networking standards covering physical and data link layer specifications
IEEE 802 is a collection of networking standards covering physical and data link layer specifications
802.1X is port-based network access control where RADIUS validates the user
802.1X is port-based network access control where RADIUS validates the user
802.1D defines the Spanning Tree Protocol for loop protection in Ethernet bridges
802.1D defines the Spanning Tree Protocol for loop protection in Ethernet bridges
Ethernet is a family of networking technologies used for local area networks.
Ethernet is a family of networking technologies used for local area networks.
802.1D defines the Spanning Tree Protocol for Ethernet MAC bridges.
802.1D defines the Spanning Tree Protocol for Ethernet MAC bridges.
The Spanning Tree Protocol (STP) provides loop protection in bridged Ethernet networks.
The Spanning Tree Protocol (STP) provides loop protection in bridged Ethernet networks.
Ethernet MAC bridges implement bridging functions and may follow standards such as 802.1D.
Ethernet MAC bridges implement bridging functions and may follow standards such as 802.1D.
Core IEEE 802 standards relevant to LAN security include 802.1X for port-based network access control.
Core IEEE 802 standards relevant to LAN security include 802.1X for port-based network access control.
Study notes highlight port ranges, common service ports, and security recommendations for network services.
Study notes highlight port ranges, common service ports, and security recommendations for network services.
Dynamic and private ports run from 49152 to 65535.
Dynamic and private ports run from 49152 to 65535.
TCP 22 (SSH) provides secure remote shell access when keys and passwords are handled correctly.
TCP 22 (SSH) provides secure remote shell access when keys and passwords are handled correctly.
TCP 23 (Telnet) is unsecure and should be avoided for remote management.
TCP 23 (Telnet) is unsecure and should be avoided for remote management.
TCP 80 (HTTP) is unencrypted and should be replaced by HTTPS where possible.
TCP 80 (HTTP) is unencrypted and should be replaced by HTTPS where possible.
TCP 443 (HTTPS) secures and encrypts data between the user's browser and a website via TLS.
TCP 443 (HTTPS) secures and encrypts data between the user's browser and a website via TLS.
UDP/TCP 53 runs DNS and is vulnerable to DDoS attacks; DNSSEC provides integrity but not confidentiality.
UDP/TCP 53 runs DNS and is vulnerable to DDoS attacks; DNSSEC provides integrity but not confidentiality.
TCP 445 (SMB) should not be open to the public because it allows file and printer sharing over the network.
TCP 445 (SMB) should not be open to the public because it allows file and printer sharing over the network.
Use encrypted ports like 995 for POP3S and 993 for IMAPS instead of their unsecured counterparts.
Use encrypted ports like 995 for POP3S and 993 for IMAPS instead of their unsecured counterparts.
The chmod command allows users to change file and directory permissions with syntax: chmod <operations> <file/directory name>.
The chmod command allows users to change file and directory permissions with syntax: chmod <operations> <file/directory name>.
IEEE 802 standards such as 802.1X and 802.1D define important network access control and bridging behaviors.
IEEE 802 standards such as 802.1X and 802.1D define important network access control and bridging behaviors.
chmod +r sample.txt -> adds read permissions to the sample.txt file
chmod +r sample.txt -> adds read permissions to the sample.txt file
mv moves files or directories from one directory to another
mv moves files or directories from one directory to another
rm removes files, directories, device nodes and symbolic links
rm removes files, directories, device nodes and symbolic links
sudo executes commands with administrative privileges
sudo executes commands with administrative privileges
Numeric chmod 7 means read, write and execute permissions
Numeric chmod 7 means read, write and execute permissions
Numeric chmod 5 means read and execute permissions
Numeric chmod 5 means read and execute permissions
IEEE 802 is a collection of networking standards covering physical and data link layer specifications
IEEE 802 is a collection of networking standards covering physical and data link layer specifications
802.1X is port-based network access control where RADIUS validates the user
802.1X is port-based network access control where RADIUS validates the user
802.1D defines the Spanning Tree Protocol for loop protection in Ethernet bridges
802.1D defines the Spanning Tree Protocol for loop protection in Ethernet bridges
Ethernet is a family of networking technologies used for local area networks.
Ethernet is a family of networking technologies used for local area networks.
802.1D defines the Spanning Tree Protocol for Ethernet MAC bridges.
802.1D defines the Spanning Tree Protocol for Ethernet MAC bridges.
The Spanning Tree Protocol (STP) provides loop protection in bridged Ethernet networks.
The Spanning Tree Protocol (STP) provides loop protection in bridged Ethernet networks.
Ethernet MAC bridges implement bridging functions and may follow standards such as 802.1D.
Ethernet MAC bridges implement bridging functions and may follow standards such as 802.1D.
Core IEEE 802 standards relevant to LAN security include 802.1X for port-based network access control.
Core IEEE 802 standards relevant to LAN security include 802.1X for port-based network access control.
Study notes highlight port ranges, common service ports, and security recommendations for network services.
Study notes highlight port ranges, common service ports, and security recommendations for network services.
chmod — change file mode (permissions). Syntax: chmod <mode> <file>; supports symbolic (+r, -x) and numeric modes.chown — change file owner (user).chgrp — change file group.chroot — run a command with a different root directory (change root environment).ls — list directory contents (use ls -l for details).pwd — print working directory.cd — change directory.mkdir / rmdir — create and remove directories.touch — update file timestamps or create empty files.cp — copy files or directories.mv — move or rename files and directories.rm — remove files, directories, symlinks (use carefully).dd — low-level copy/convert utility (specify if= input file and of= output file).cat — display file contents or concatenate files.ps — show process status (snapshot of running processes).time / times — measure command execution time or display process times.uname — print basic system information.sudo — run commands with elevated (superuser) privileges.groups — show group memberships.locate — find files by name using a database (fast, depends on updatedb).cksum — compute checksum and byte count for files.ExifTool — read/write metadata from multimedia files.chmod 755 file means owner \(7\), group \(5\), others \(5\)).chmod u+rwx,g+rx,o+rx file or shorter chmod u=rw,g=r,o=r file.ls, cd, chmod, chown, ps, cp, mv, rm) until comfortable.Are you sure you want to delete 0 flashcard(s)? This cannot be undone.
Select tags to remove from 0 selected flashcard(s):
Loading tags...