Watch this video on YouTube
Fill in the blank: In an AI-driven cyber range, running a port scan to identify open ports on a simulated target machine is done using the command ________ -sV .