AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Sam, the evil hacker, decided to use Nmap eccouncil video

Question 1 Be Honest
« Back   Next eccouncil ethical-hacker Exam Question »
Answer

Full Certification Question

Sam, the evil hacker, decided to use Nmap scan open ports and running services on systems connected to the target organization's OT network. For his purposes, he enters the Nmap command into the terminal which identifies Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address. Which of the following commands did Sam use in this scenario?