An organization requires a detailed inventory of services and operating systems of devices in their internal network without causing significant network disruption. As a cybersecurity analyst, which Nmap command would you use to perform an unobtrusive and in-depth network scan?
The correct command -sV enables version detection to discover service version information, which is useful for creating a detailed inventory. Using -T2 along with -sV slows down the scan to reduce network load and potential disruption. Option A's -O flag is for OS detection but does not reduce the scan aggressiveness, and -T4 would increase the scan speed, likely causing more network disruption. Option B's -sn flag would only perform a ping scan, which doesn't gather service or OS version details. Option C's -Pn skips the discovery phase, which is not suitable when a detailed inventory is needed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the '-sV' flag do in Nmap?
Open an interactive chat with Bash
What does the 'T' option mean in Nmap commands?
Open an interactive chat with Bash
Why is the '-sn' option not suitable for gathering service information?