Page 1550 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1550
Chapter 15: Security Assessment and Testing
1. A. Nmap is a network discovery scanning tool that reports the open
ports on a remote system.
2. D. Only open ports represent potentially significant security risks.
Ports 80 and 443 are expected to be open on a web server. Port
1433 is a database port and should never be exposed to an external
network.
3. C. The sensitivity of information stored on the system, difficulty of
performing the test, and likelihood of an attacker targeting the
system are all valid considerations when planning a security testing
schedule. The desire to experiment with new testing tools should
not influence the production testing schedule.
4. C. Security assessments include many types of tests designed to
identify vulnerabilities, and the assessment report normally
includes recommendations for mitigation. The assessment does
not, however, include actual mitigation of those vulnerabilities.
5. A. Security assessment reports should be addressed to the
organization’s management. For this reason, they should be
written in plain English and avoid technical jargon.
6. B. The use of an 8-bit subnet mask means that the first octet of the
IP address represents the network address. In this case, that means
10.0.0.0/8 will scan any IP address beginning with 10.
7. B. The server is likely running a website on port 80. Using a web
browser to access the site may provide important information
about the site’s purpose.
8. B. The SSH protocol uses port 22 to accept administrative
connections to a server.
9. D. Authenticated scans can read configuration information from
the target system and reduce the instances of false positive and
false negative reports.

