Page 1119 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1119

D.  Threat assessment

                5.  Who is the intended audience for a security assessment report?


                    A.  Management
                    B.  Security auditor


                    C.  Security professional

                    D.  Customers

                6.  Beth would like to run an nmap scan against all of the systems on
                    her organization’s private network. These include systems in the
                    10.0.0.0 private address space. She would like to scan this entire
                    private address space because she is not certain what subnets are
                    used. What network address should Beth specify as the target of

                    her scan?

                    A.  10.0.0.0/0

                    B.  10.0.0.0/8

                    C.  10.0.0.0/16

                    D.  10.0.0.0/24

                7.  Alan ran an nmap scan against a server and determined that port
                    80 is open on the server. What tool would likely provide him the
                    best additional information about the server’s purpose and the
                    identity of the server’s operator?


                    A.  SSH

                    B.  Web browser

                    C.  telnet

                    D.  ping

                8.  What port is typically used to accept administrative connections
                    using the SSH utility?

                    A.  20

                    B.  22


                    C.  25
   1114   1115   1116   1117   1118   1119   1120   1121   1122   1123   1124