Watch this video on YouTube
An ethical hacker wants to perform an automated network sweep to detect live hosts using AI. What initial command should they execute?