Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 182 Topic 19 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 182 Topic 19 Discussion

312-50v13 Exam Topic 19 Question 182 Discussion:
Question #: 182
Topic #: 19

Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure. Jim used Nmap to scan open pons and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered Information such as the vendor name, product code and name, device name, and IP address. Which of the following Nmap commands helped Jim retrieve the required information?


A.

nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >


B.

nmap -Pn -sU -p 44818 --script enip-info < Target IP >


C.

nmap -Pn -sT -p 46824 < Target IP >


D.

nmap -Pn -sT -p 102 --script s7-info < Target IP >


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.