Complete the command to scan all ports on a target IP using Nmap.
nmap -p [1] 192.168.1.1
The option -p 1-65535 tells Nmap to scan all ports from 1 to 65535 on the target IP.
Complete the command to perform a TCP SYN scan on a target IP.
nmap [1] 192.168.1.1
-sU which is for UDP scans.-sT which is a full TCP connect scan.The -sS option performs a TCP SYN scan, which is a fast and stealthy scan type.
Fix the error in the command to scan ports 20 to 25 on a target IP.
nmap -p [1] 192.168.1.1
The correct syntax for specifying a port range in Nmap is 20-25 using a hyphen.
Fill both blanks to scan a target IP with service version detection and OS detection.
nmap [1] [2] 192.168.1.1
-sV enables service version detection, and -O enables OS detection in Nmap scans.
Fill all three blanks to create a command that scans ports 80 and 443, performs a TCP connect scan, and outputs results in normal format.
nmap [1] -p [2] [3] 192.168.1.1
-sS instead of -sT for TCP connect scan.-sT performs a TCP connect scan, -p 80,443 scans ports 80 and 443, and -oN outputs results in normal format.