Watch this video on YouTube
When conducting a compliance audit, how can Nmap be used to verify that no unauthorized servers are running SSH on a network?