Page 1550 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1550

Chapter 15: Security Assessment and Testing




                1.  A. Nmap is a network discovery scanning tool that reports the open

                    ports on a remote system.
                2.  D. Only open ports represent potentially significant security risks.

                    Ports 80 and 443 are expected to be open on a web server. Port
                    1433 is a database port and should never be exposed to an external
                    network.

                3.  C. The sensitivity of information stored on the system, difficulty of
                    performing the test, and likelihood of an attacker targeting the
                    system are all valid considerations when planning a security testing

                    schedule. The desire to experiment with new testing tools should
                    not influence the production testing schedule.

                4.  C. Security assessments include many types of tests designed to
                    identify vulnerabilities, and the assessment report normally
                    includes recommendations for mitigation. The assessment does
                    not, however, include actual mitigation of those vulnerabilities.

                5.  A. Security assessment reports should be addressed to the

                    organization’s management. For this reason, they should be
                    written in plain English and avoid technical jargon.

                6.  B. The use of an 8-bit subnet mask means that the first octet of the
                    IP address represents the network address. In this case, that means
                    10.0.0.0/8 will scan any IP address beginning with 10.

                7.  B. The server is likely running a website on port 80. Using a web
                    browser to access the site may provide important information
                    about the site’s purpose.


                8.  B. The SSH protocol uses port 22 to accept administrative
                    connections to a server.

                9.  D. Authenticated scans can read configuration information from
                    the target system and reduce the instances of false positive and
                    false negative reports.
   1545   1546   1547   1548   1549   1550   1551   1552   1553   1554   1555