Page 1119 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1119
D. Threat assessment
5. Who is the intended audience for a security assessment report?
A. Management
B. Security auditor
C. Security professional
D. Customers
6. Beth would like to run an nmap scan against all of the systems on
her organization’s private network. These include systems in the
10.0.0.0 private address space. She would like to scan this entire
private address space because she is not certain what subnets are
used. What network address should Beth specify as the target of
her scan?
A. 10.0.0.0/0
B. 10.0.0.0/8
C. 10.0.0.0/16
D. 10.0.0.0/24
7. Alan ran an nmap scan against a server and determined that port
80 is open on the server. What tool would likely provide him the
best additional information about the server’s purpose and the
identity of the server’s operator?
A. SSH
B. Web browser
C. telnet
D. ping
8. What port is typically used to accept administrative connections
using the SSH utility?
A. 20
B. 22
C. 25

