Exam Preparation Tasks
As mentioned in the section “How to Use This Book” in the Introduction, you have several choices for exam preparation: the exercises here, Chapter 12, “Final Preparation,” and the exam simulation questions in the Pearson Test Prep Software Online.
Review All Key Topics
Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 3-9 lists a reference of these key topics and the page numbers on which each is found.
Table 3-9 Key Topics for Chapter 3
Key Topic Element |
Description |
|---|---|
Footprinting and Scanning Steps |
|
Section |
Footprinting and Reconnaissance Methodology |
Paragraph/list |
Advanced Google hacking |
Paragraph |
Using Shodan to find vulnerable systems |
Section |
Footprinting Through Social Networking Sites |
Section |
Network Footprinting |
Section |
Footprinting Countermeasures |
Section |
Host Discovery |
Section |
Port and Service Discovery |
Table 3-7 |
TCP Flag Types |
Section |
OS Discovery (Banner Grabbing/OS Fingerprinting) and Scanning Beyond IDS and Firewall |
Section |
Finding Open Services |
A Network Diagram of Discovered Devices and Applications |
