0% found this document useful (0 votes)
73 views5 pages

21BCE5693

The document discusses basic networking commands like ipconfig, arp, hostname, ifconfig, route, getmac, curl, host, whois, nbtstat, and pathping. It also covers information security terminologies including types of attacks like malware and denial of service attacks.

Uploaded by

VIKASH KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views5 pages

21BCE5693

The document discusses basic networking commands like ipconfig, arp, hostname, ifconfig, route, getmac, curl, host, whois, nbtstat, and pathping. It also covers information security terminologies including types of attacks like malware and denial of service attacks.

Uploaded by

VIKASH KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Name: Pruthivi Raj V S Vulapalli

Reg no: 21BCE5693

Assignment 1:

1. Basic Networking commands


2. Information Security Terminologies
- Attacks and its types
- Viruses and its types

1. Ipconfig This command displays all the TCP/IP network configuration values and
refreshes dynamic host configuration protocol. (DHCP)
2. ARP This command is used to display and modify the IP to physical address.

3. Hostname The hostname command is used to display the host name of the computer or
device in the network.

4. Ifconfig A utility device in an OS that is used to display the IP address and netmask of
a network interface.

5. Route This command is used to display and manipulate the routing table.
6. Getmac This command is line tool that displays the media access control (MAC)
addresses of all network adapters in a system.

7. Curl The curl command is mostly used to transfer data over the network and
supports various protocols.

8. Host The host commands are used to get the IP address of a specific domain, or
you can get the domain name from specific IP address.

9. WHOIS The whois can help you find info about registered domains, IP addresses,
name servers, and a lot more as it is the client for the whois directory
service.

10. Nbtstat NbtStat is a networking utility in Windows that helps users troubleshoot
NetBIOS over TCP/IP problems.

11. PathPing The PathPing command is a command-line network utility included in


Windows NT operating systems since Windows 2000 that combines the
functionality of ping with that of tracert.
Information Security terminologies:

1. Attacks and its types:

- Malware:
Malware is any software intentionally designed to cause disruption to a computer,
server, client, or computer network, leak private information, gain unauthorized access
to information or systems, deprive access to information, or which unknowingly
interferes with the user's computer security and privacy.

- Denial of Service:
A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to a network.

You might also like