adplus-dvertising
frame-decoration

Question

Which Nmap flag is commonly used to conduct a fast scan through most firewalls and sends only a SYN?

a.

-sA

b.

-sS

c.

-sT

d.

-sU

Answer: (b).-sS Explanation:The -sS flag in Nmap is commonly used for a TCP SYN (stealth) scan, allowing for fast scans through most firewalls.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which Nmap flag is commonly used to conduct a fast scan through most firewalls and sends only a SYN?

Similar Questions

Discover Related MCQs

Q. What is the purpose of the -sU flag in Nmap?

Q. How does the -sA flag in Nmap differ from other scan techniques?

Q. What does the -T0 to -T5 flags in Nmap impact?

Q. What does the -Pn flag in Nmap do?

Q. What is the purpose of the -IL flag in Nmap?

Q. Which flag in Nmap is used for service version detection?

Q. What is the default speed setting for Nmap scans?

Q. Which flag in Nmap is used for OS detection?

Q. What is the purpose of the -oA flag in Nmap?

Q. What additional information does Zenmap, the official graphical user interface for Nmap, provide?

Q. What does the -sT flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -sV flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the purpose of the -Pn flag in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -p 1-65435 flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What does the -T2 flag indicate in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the purpose of the -oA flag in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. What is the target's hostname in the Nmap command line "nmap -sT -sV -Pn -p 1-65435 -T2 -oA scanme scanme.nmap.org"?

Q. How can the Nmap scripting engine (NSE) be used for vulnerability scanning?

Q. Why is understanding the topology of a network crucial for a penetration tester?

Q. How can topology diagrams be generated for a network?