nmap -sS 192.168.1.1 perform?Choose the correct description of what the command nmap -sS 192.168.1.1 does.
nmap -sS 192.168.1.1The -sS option is a common scan type in Nmap that uses a stealthy method.
The -sS option tells Nmap to perform a TCP SYN scan, which sends SYN packets to ports and waits for responses to determine if ports are open without completing the TCP handshake.
Identify the correct Nmap option to scan only ports 22, 80, and 443 on a target.
Look for the option that specifies ports directly.
The -p option in Nmap allows you to specify which ports to scan by listing them separated by commas.
nmap -sS and nmap -sT scans?Analyze the difference in behavior between the two scan types and select the correct statement.
Consider how each scan interacts with the TCP handshake process.
-sS sends SYN packets and waits for SYN-ACK without completing the handshake, making it stealthier. -sT completes the full TCP handshake, which is more detectable.
Select the Nmap scan type that avoids completing the TCP handshake to reduce detection risk.
Think about which scan sends SYN packets but does not complete the handshake.
The SYN scan (-sS) sends SYN packets and does not complete the TCP handshake, making it stealthier than the TCP connect scan (-sT), which completes the handshake.
PORT STATE SERVICE 22/tcp open ssh 80/tcp filtered http 443/tcp closed https
Analyze the port states and select the correct explanation for the open port.
Recall what 'open', 'filtered', and 'closed' mean in Nmap results.
'Open' means the port responded positively to connection attempts. 'Filtered' means packets are blocked or dropped by a firewall, so Nmap cannot determine if the port is open. 'Closed' means the port is reachable but not accepting connections.