Page 1118 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1118

Review Questions



                1.  Which one of the following tools is used primarily to perform
                    network discovery scans?

                    A.  Nmap

                    B.  Nessus

                    C.  Metasploit


                    D.  lsof
                2.  Adam recently ran a network port scan of a web server running in
                    his organization. He ran the scan from an external network to get

                    an attacker’s perspective on the scan. Which one of the following
                    results is the greatest cause for alarm?

                    A.  80/open


                    B.  22/filtered

                    C.  443/open

                    D.  1433/open
                3.  Which one of the following factors should not be taken into
                    consideration when planning a security testing schedule for a

                    particular system?

                    A.  Sensitivity of the information stored on the system

                    B.  Difficulty of performing the test

                    C.  Desire to experiment with new testing tools

                    D.  Desirability of the system to attackers

                4.  Which one of the following is not normally included in a security
                    assessment?

                    A.  Vulnerability scan

                    B.  Risk assessment


                    C.  Mitigation of vulnerabilities
   1113   1114   1115   1116   1117   1118   1119   1120   1121   1122   1123