In: Computer Science
Part#1
Part#2
Part#3
Please answer these questions. Thnks
#Part 1
----------------------------------------------------------------------------------
What are the default username and password for Kali Linux?
Ans:
username: root
password: toor
How many bits is the MD5 hashing algorithm?
Ans:
128-bits
How many bits is the SHA1 hashing algorithm?
Ans:
160-bits
Which hashing algorithm is more accurate, MD5 or SHA1?
Ans:
SHA1
#Part 2
---------------------------------------------------------------------
What is the command to unmount a partition?
Ans:
umount -a
In what directories are mount points typically created on Linux?
Ans:
/etc/fstab
When the ls –l command is used, what is designated in the first column to indicate a file?
Ans:
ls -l command used to display various information related to file permission. First column represents different access modes, i.e., the permission associated with a file or a directory.
When the ls –l command is used, what is designated in the first column to indicate a folder?
Ans:
ls -l command used to display various information related to file permission. First column represents different access modes, i.e., the permission associated with a file or a directory.
#Part 3
---------------------------------------------------------------
For what purpose is Foremost used?
Ans:
It is used as a general data recovery tool.
What is the way to get the manual page for the foremost command?
Ans:
man foremost
What command can be utilized to get general information about Foremost?
Ans:
foremost -h
What options must be specified when the foremost command is utilized?
Ans:
-t command to specify file type
-I command to specify partition
example: foremost –t jpeg –I /dev/sda1