In the Nmap command shown, which port ranges are scanned?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

In the Nmap command shown, which port ranges are scanned?

Explanation:
Understanding how Nmap selects ports is key here. The -p option specifies which ports to scan, and 0-65535 means every possible port number. When the command includes both a TCP scan flag (for example, a TCP connect or SYN scan) and a UDP scan flag, and uses -p 0-65535, Nmap will probe all TCP ports and all UDP ports from 0 through 65535. That’s why the answer includes both TCP and UDP ranges across the full spectrum. The other options don’t fit because they limit the scope: only ports like 80 and 443 would require targeting those specific ports; scanning only TCP would exclude UDP, and scanning only UDP would exclude TCP.

Understanding how Nmap selects ports is key here. The -p option specifies which ports to scan, and 0-65535 means every possible port number. When the command includes both a TCP scan flag (for example, a TCP connect or SYN scan) and a UDP scan flag, and uses -p 0-65535, Nmap will probe all TCP ports and all UDP ports from 0 through 65535. That’s why the answer includes both TCP and UDP ranges across the full spectrum.

The other options don’t fit because they limit the scope: only ports like 80 and 443 would require targeting those specific ports; scanning only TCP would exclude UDP, and scanning only UDP would exclude TCP.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy