You are troubleshooting remote access to a newly deployed application server at 10.2.0.25. Before changing any firewall rules, you need a quick inventory of which TCP ports respond from your workstation. Which single Nmap command performs this most basic discovery scan?
Running "nmap " by itself performs Nmap's default scan, which first pings the host and then probes the 1,000 most-common TCP ports, reporting any that are open. Options such as -A enable additional tests like OS, version, script scans and traceroute; -sV adds only service-version detection; --top-ports 10 restricts the probe set to the ten most-common ports. None of those extra options is necessary for a straightforward baseline port inventory.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of Nmap in network scanning?
Open an interactive chat with Bash
What is the difference between a basic scan and using the `-A` or `-sV` options in Nmap?
Open an interactive chat with Bash
What does the `--top-ports` option do in an Nmap scan?