Which Nmap command is designed to scan both TCP and UDP ports?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which Nmap command is designed to scan both TCP and UDP ports?

Explanation:
Scanning both TCP and UDP ports requires using scan types for both protocols and explicitly listing ports for each. The best command does exactly that: it runs a TCP scan (the stealthy SYN type) and a UDP scan, while separating the port ranges so every TCP port and every UDP port from 0 through 65535 are covered. This ensures no ports are missed on either protocol. The extra options speed up and deepen the scan, such as skipping DNS resolution, avoiding host discovery, increasing verbosity, enabling aggressive detection, and exporting results in XML. The other options either target only TCP or only a subset of ports, or don’t pair the UDP port range with the UDP scan, so they don’t guarantee a full dual-protocol port sweep.

Scanning both TCP and UDP ports requires using scan types for both protocols and explicitly listing ports for each. The best command does exactly that: it runs a TCP scan (the stealthy SYN type) and a UDP scan, while separating the port ranges so every TCP port and every UDP port from 0 through 65535 are covered. This ensures no ports are missed on either protocol. The extra options speed up and deepen the scan, such as skipping DNS resolution, avoiding host discovery, increasing verbosity, enabling aggressive detection, and exporting results in XML. The other options either target only TCP or only a subset of ports, or don’t pair the UDP port range with the UDP scan, so they don’t guarantee a full dual-protocol port sweep.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy