The vim command is used to open a text editor; ls displays files within a directory; grep searches for strings of characters within a file; and ifconfig displays information about the network interface card.
6. Why would a rootkit be used by a hacker?
A. to gain access to a device without being detected
When the apt-get upgrade command is issued in a Linux terminal, all installed applications will attempt to upgrade to the latest version available.
8. A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?