If you want to perform a TCP stealth scan, which of the following commands you should use?
a. nmap –sT 192.168.1.108
b. nmap –sS 192.168.1.108
c. nmap -sU 192.168.1.108
d. nmap –sI 192.168.1.108
ANS: B
Computer Science & Information Technology
You might also like to view...
A Truth Table is a matrix that provides true or false for every possible combination for an OR, NOT, or AND criteria combination
Indicate whether the statement is true or false
Computer Science & Information Technology
What are two possible problems with using an array-based bag implementation
What will be an ideal response?
Computer Science & Information Technology