You are conducting network discovery for a penetration test. Once you gain access, you want to gain an overall picture of the host, services, etc on the network. Which one command would you see if you can run on the network to gain that picture?
|Operations and Incident Response|
|Architecture and Design|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|