Home > Articles

This chapter is from the book

Exam Preparation Tasks

As mentioned in the section “How to Use This Book” in the Introduction, you have several choices for exam preparation: the exercises here, Chapter 12, “Final Preparation,” and the exam simulation questions in the Pearson Test Prep Software Online.

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 3-9 lists a reference of these key topics and the page numbers on which each is found.

Table 3-9 Key Topics for Chapter 3

Key Topic Element

Description

Figure 3-1

Footprinting and Scanning Steps

Section

Footprinting and Reconnaissance Methodology

Paragraph/list

Advanced Google hacking

Paragraph

Using Shodan to find vulnerable systems

Section

Footprinting Through Social Networking Sites

Section

Network Footprinting

Section

Footprinting Countermeasures

Section

Host Discovery

Section

Port and Service Discovery

Table 3-7

TCP Flag Types

Section

OS Discovery (Banner Grabbing/OS Fingerprinting) and Scanning Beyond IDS and Firewall

Section

Finding Open Services

Figure 3-12

A Network Diagram of Discovered Devices and Applications

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.