Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: File Analysis Tools & Computer Networking 2
Description: - file analysis - computer networking 2
Description: - file analysis - computer networking 2
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
Delwin Thermitus
03/27/2022
Cyber Security
File Analysis Tools
-
The File command is for determining the type of file
...
COMMANDS
-
ZIP
GZIP
UNRAR
TAR
-
ASCII means plain
-
IPv4 in depth
Computer & Network 2
Binary Math
- IPv4 Address
- IPv4 is represented in decimal somewhere in the range of:
▪ 0
...
0
...
255
...
255
- In autuality, It is 4 bytes
...
Special/ Reserved IPv4 Addresses
- 127
...
0
...
- Technically a range from
▪ 127
...
0
...
255
...
254
- Broadcast Address
- The last address in a Subnet is typically reserved for the Broadcast Address
...
- Router Address
- The first number in a Subnet is reserved for the network name
...
Reserved Addresses
- 240
...
0
...
255
...
254
- Reserved for testing/ future use
The case for IPv6
- IPv4 is limited
- IPv6 is huge
Summary
- IPv4 Binary Math
- It is all about the 1’s and 0’s
- We still represent IPv4 Addresses in decimal
- Subnet Mask splits the IPv4 addresses into 2 parts
- The Subnet Mask the device IP Address
- CIDR Notation (/24) refers to how many 1’s are in the binary representation of
the Subnet Mask
...
0
...
1 is the Loopback/ home IPv4 address
...
168
...
0/24)
The second IPv4 address of a Subnet is reserved for the Broadcast
-
IPv6 will take a while to take over
Title: File Analysis Tools & Computer Networking 2
Description: - file analysis - computer networking 2
Description: - file analysis - computer networking 2