Ah, I've got this one! The --sV version scan is designed to probe open ports to determine service/version info. That's exactly what we need to identify SSL/TLS services running on the target. B is the way to go.
I'm a little confused by the options here. I know --sU is for UDP scans, and --sT is for TCP connect scans, but I'm not sure how those relate to identifying SSL services. I'll have to think this through carefully.
The key here is identifying which scan option can detect SSL/TLS services. Based on my understanding, the --sV version scan is the best choice for that purpose.
Hmm, I'm a bit unsure about this one. I know --sS is for a SYN scan, but I'm not sure if that would identify SSL services. Maybe I should review my notes on the different Nmap scan options.
Bernadine
4 months agoFlo
4 months agoOrville
4 months agoCecilia
4 months agoDorsey
4 months agoYuriko
5 months agoKyoko
5 months agoKristeen
5 months agoDenny
5 months agoCatarina
6 months agoElfriede
6 months agoGwen
6 months agoAnika
6 months agoEarleen
6 months agoDino
12 months agoJolanda
10 months agoAriel
10 months agoAntione
11 months agoHarrison
11 months agoJusta
1 year agoMaurine
1 year agoLong
10 months agoMarkus
10 months agoAudra
10 months agoSylvia
11 months agoHeike
11 months agoKati
11 months agoLouvenia
1 year agoDiane
1 year agoDenny
1 year agoEleonora
1 year ago