Ah, I've got this one! The --sV version scan is designed to probe open ports to determine service/version info. That's exactly what we need to identify SSL/TLS services running on the target. B is the way to go.
I'm a little confused by the options here. I know --sU is for UDP scans, and --sT is for TCP connect scans, but I'm not sure how those relate to identifying SSL services. I'll have to think this through carefully.
The key here is identifying which scan option can detect SSL/TLS services. Based on my understanding, the --sV version scan is the best choice for that purpose.
Hmm, I'm a bit unsure about this one. I know --sS is for a SYN scan, but I'm not sure if that would identify SSL services. Maybe I should review my notes on the different Nmap scan options.
Bernadine
2 months agoFlo
2 months agoOrville
2 months agoCecilia
3 months agoDorsey
3 months agoYuriko
3 months agoKyoko
3 months agoKristeen
4 months agoDenny
4 months agoCatarina
4 months agoElfriede
4 months agoGwen
4 months agoAnika
5 months agoEarleen
5 months agoDino
10 months agoJolanda
9 months agoAriel
9 months agoAntione
10 months agoHarrison
10 months agoJusta
11 months agoMaurine
11 months agoLong
9 months agoMarkus
9 months agoAudra
9 months agoSylvia
9 months agoHeike
10 months agoKati
10 months agoLouvenia
11 months agoDiane
11 months agoDenny
11 months agoEleonora
11 months ago