An organization requires a detailed inventory of services and operating systems of devices in their internal network without causing significant network disruption. As a cybersecurity analyst, which Nmap command would you use to perform an unobtrusive and in-depth network scan?
The correct command -sV enables version detection to discover service version information, which is useful for creating a detailed inventory. Using -T2 along with -sV slows down the scan to reduce network load and potential disruption. Option A's -O flag is for OS detection but does not reduce the scan aggressiveness, and -T4 would increase the scan speed, likely causing more network disruption. Option B's -sn flag would only perform a ping scan, which doesn't gather service or OS version details. Option C's -Pn skips the discovery phase, which is not suitable when a detailed inventory is needed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the `-sV` flag in Nmap do?
Open an interactive chat with Bash
Why is `-T2` used instead of `-T4` in this scan?
Open an interactive chat with Bash
What is the difference between `-O` and `-sV` in Nmap?