If you want to perform a TCP stealth scan, which of the following commands you should use?

a. nmap –sT 192.168.1.108
b. nmap –sS 192.168.1.108
c. nmap -sU 192.168.1.108
d. nmap –sI 192.168.1.108

ANS: B

Computer Science & Information Technology

You might also like to view...

A Truth Table is a matrix that provides true or false for every possible combination for an OR, NOT, or AND criteria combination

Indicate whether the statement is true or false

Computer Science & Information Technology

What are two possible problems with using an array-based bag implementation

What will be an ideal response?

Computer Science & Information Technology