The correct answer is device fingerprinting. The Nmap command uses the -sV flag for service and version detection and the -O flag for operating system (OS) detection. The process of gathering specific details about a device, such as its OS, open ports, and running service versions, is known as device fingerprinting. Credentialed vulnerability scanning requires authentication and was not performed. Static application security testing (SAST) involves analyzing an application's source code, which is not what Nmap does. Exploitation involves actively trying to leverage a vulnerability, which is a different phase of vulnerability management and is not accomplished with these Nmap flags.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of characteristics are collected during device fingerprinting?
Open an interactive chat with Bash
How does device fingerprinting contribute to vulnerability management?
Open an interactive chat with Bash
How does device fingerprinting differ from asset tagging?