Which of the following should an IS auditor expect to see in a network vulnerability assessment?