CHAPTER 1 Evolution of Hacking
C
Written authorization
Vulnerablilty
Scanning
D
D
B
D
D
D
CHAPTER 2 TCP/IP Review
C
D
B
C
ping
B
D
B
C
B
CHAPTER 3 Cryptographic Concepts
A
B
D
C
A
C
C
D
B
A
A
A
A
CHAPTER 4 Physical Security
B
C
C
Bollard
A
C
D
A
D
D
B
D
A
CHAPTER 5 Footprinting Tools and Techniques
A
A
D
EDGAR
C
ARIN
C
B
D
A
CHAPTER 6 Port Scanning
A
C
D
B
A
B
D
A
UDP
D
B
A
C
CHAPTER 7 Enumeration and Computer System Hacking
B
B
B
A
A
B
Backdoor
A
A
Password cracker
A
C
CHAPTER 8 Wireless Vulnerabilities
B
A
Bluetooth
A
D
A
B
A
A
C
CHAPTER 9 Hacking Web Servers
B
A
B
B
B
A and C
C
B
B
CHAPTER 10 Trojans and Backdoors
B
A
C
C
C
B
B
Education
A
A
B
A
Logic bombs
B
CHAPTER 11 Malware, Worms, and Viruses
A
A
D
B
Covert channels
A
A
D
CHAPTER 12 Sniffers, Session Hacking, and Denial of Service Attacks
A
B
B
A
A
Hijacking
MAC flooding
A
B
B
CHAPTER 13 Linux, Live CDs, and Automated Assessment Tools
A
B
A
A
B
B
A
A
B
A
CHAPTER 14 Incident Response
Fault tolerance
Chief information security officer (CISO), Information security officer (ISO), Chief security officer (CSO), Chief executive officer (CEO), Chief information officer (CIO), Chief operating officer (COO)
A
B
Evidence
C
Secondary evidence
Alternate site
CHAPTER 15 Defensive Technologies
B
C
A
B
A
A
A
A
B
D
3.15.11.226