In the Nmap command shown, which port ranges are scanned?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

In the Nmap command shown, which port ranges are scanned?

Explanation:
Understanding how Nmap selects ports is key here. The -p option specifies which ports to scan, and 0-65535 means every possible port number. When the command includes both a TCP scan flag (for example, a TCP connect or SYN scan) and a UDP scan flag, and uses -p 0-65535, Nmap will probe all TCP ports and all UDP ports from 0 through 65535. That’s why the answer includes both TCP and UDP ranges across the full spectrum. The other options don’t fit because they limit the scope: only ports like 80 and 443 would require targeting those specific ports; scanning only TCP would exclude UDP, and scanning only UDP would exclude TCP.

Understanding how Nmap selects ports is key here. The -p option specifies which ports to scan, and 0-65535 means every possible port number. When the command includes both a TCP scan flag (for example, a TCP connect or SYN scan) and a UDP scan flag, and uses -p 0-65535, Nmap will probe all TCP ports and all UDP ports from 0 through 65535. That’s why the answer includes both TCP and UDP ranges across the full spectrum.

The other options don’t fit because they limit the scope: only ports like 80 and 443 would require targeting those specific ports; scanning only TCP would exclude UDP, and scanning only UDP would exclude TCP.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy