Watch this video on YouTube
A hacker is attempting to see which protocols are supported by target machines or network. Which NMAP switch would the hacker use?