Question

In: Computer Science

Part#1 What are the default username and password for Kali Linux? How many bits is the...

Part#1

  1. What are the default username and password for Kali Linux?
  2. How many bits is the MD5 hashing algorithm?
  3. How many bits is the SHA1 hashing algorithm?
  4. Which hashing algorithm is more accurate, MD5 or SHA1?

Part#2

  1. What is the command to unmount a partition?
  2. In what directories are mount points typically created on Linux?
  3. When the ls –l command is used, what is designated in the first column to indicate a file?
  4. When the ls –l command is used, what is designated in the first column to indicate a folder?

Part#3

  1. For what purpose is Foremost used?
  2. What is the way to get the manual page for the foremost command?
  3. What command can be utilized to get general information about Foremost?
  4. What options must be specified when the foremost command is utilized?

Please answer these questions. Thnks  

Solutions

Expert Solution

#Part 1

----------------------------------------------------------------------------------

What are the default username and password for Kali Linux?

Ans:

username: root

password: toor

How many bits is the MD5 hashing algorithm?

Ans:

128-bits

How many bits is the SHA1 hashing algorithm?

Ans:

160-bits

Which hashing algorithm is more accurate, MD5 or SHA1?

Ans:

SHA1

#Part 2

---------------------------------------------------------------------

What is the command to unmount a partition?

Ans:

umount -a

In what directories are mount points typically created on Linux?

Ans:

/etc/fstab

When the ls –l command is used, what is designated in the first column to indicate a file?

Ans:

ls -l command used to display various information related to file permission.  First column represents different access modes, i.e., the permission associated with a file or a directory.

When the ls –l command is used, what is designated in the first column to indicate a folder?

Ans:

ls -l command used to display various information related to file permission.  First column represents different access modes, i.e., the permission associated with a file or a directory.

#Part 3

---------------------------------------------------------------

For what purpose is Foremost used?

Ans:

It is used as a general data recovery tool.

What is the way to get the manual page for the foremost command?

Ans:

man foremost

What command can be utilized to get general information about Foremost?

Ans:

foremost -h

What options must be specified when the foremost command is utilized?

Ans:

-t command to specify file type

-I command to specify partition

example: foremost –t jpeg –I /dev/sda1


Related Solutions

What would these commands look like in Kali Linux? In Kali Linux: a) Create a user...
What would these commands look like in Kali Linux? In Kali Linux: a) Create a user (username= YOUR-FIRSTNAME). b) Create a file (filename=test) and use chmod command to add the write permission for Others. c) Use setfacl to remove write permission to YOUR-FIRSTNAME user. Use getfacl to check the file's permissions. d) Remove YOUR-FIRSTNAME user. Deliverable(Screenshots from each section if possible please)
Python Coding 1. validate_username_password(username, password, users): This function checks if a given username and password matches...
Python Coding 1. validate_username_password(username, password, users): This function checks if a given username and password matches in the stored users dictionary. This function returns True if a match found otherwise returns False. 2. validate_existing_user(users): This function asks for username and password and checks if user provided name and password matches. It prints an informational message and returns username if it does find a match. Call validate_username_password() function to perform this validation. A user has total of three chances to validate....
How LUNCH meterpreter in Kali Linux. Complete command please. Thank you
How LUNCH meterpreter in Kali Linux. Complete command please. Thank you
Q-1) a client wants to log into a server by using username and password first name...
Q-1) a client wants to log into a server by using username and password first name a suitable http mechanism like cookie or session to make it happen and then make a signal flow diagram to show that how does it happen
1. When a file is created on Linux Operating System, What are the default permissions of...
1. When a file is created on Linux Operating System, What are the default permissions of the file? 2. Write a command to find the total disk space used by a specific user on linux system? 3. What is "s" permission bit in a file? 4. Explain the difference between grep and egrep? 5. Write a command to list files where third letter is x or y? 6. Write command to remove array element with id 5? 7. Write a...
Clark 202 Part 1: Approximately how many bits are required to address a 4M x 16...
Clark 202 Part 1: Approximately how many bits are required to address a 4M x 16 main memory if: a. Main memory is byte addressable? b. or Main memory is word addressable? Part 2: Consider 256 x 8 RAM chips for the following: a. About how many are needed to provide a memory capacity of 4096 bytes? b. How many lines must go to each and every chip? Part 3: Digital computers have a memory unit with 24 bits per...
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory...
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory to Downloads 3. Make a new directory 4. Make a new text file under your name (Ghada.txt) 5. Write a paragraph about Cyber security (4 to 5 sentences) >>simply open the file and write inside it 6. Change the permission to be 764 7. Open the file but with a cyber security match Show me each and every step with figure b. Enter into...
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For...
How many bits are required to address the program memory of PIC16F887? What is PCLATH? For PC absolute addressing, describe how to write assembly program to jump to code located in a different program memory page.
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
1. Many operating systems now operate on 64 bits of memory. What is the highest base...
1. Many operating systems now operate on 64 bits of memory. What is the highest base 10 number it could store? 2. How many bits would you need to store the number 8,000,000? 3. How many bits is 5 Gigabytes? 4. In order to get back the original signal without distortion I must sample at _____________ the highest frequency in the signal. a. at least 2 times b. exactly c. exactly 2 times d. at least half
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT