Interpreting the Nmap command 'nmap -sU -p445 192.168.0.0/24', which statement is correct?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

Interpreting the Nmap command 'nmap -sU -p445 192.168.0.0/24', which statement is correct?

Explanation:
The command uses a UDP scan to check a specific port on a whole subnet. The -sU option tells Nmap to probe UDP ports, and -p445 restricts the probe to port 445. The target 192.168.0.0/24 means you’re scanning every host in that /24 range. So you’re asking Nmap to see if there is a UDP service listening on port 445 on any of those hosts, and to report whether that port is open, closed, or filtered. This isn’t about NetBIOS, which uses different ports, and port 445 is commonly associated with SMB over TCP, not UDP. If Nmap reports that UDP port 445 is open on a host, that is exactly what the command is testing for.

The command uses a UDP scan to check a specific port on a whole subnet. The -sU option tells Nmap to probe UDP ports, and -p445 restricts the probe to port 445. The target 192.168.0.0/24 means you’re scanning every host in that /24 range. So you’re asking Nmap to see if there is a UDP service listening on port 445 on any of those hosts, and to report whether that port is open, closed, or filtered. This isn’t about NetBIOS, which uses different ports, and port 445 is commonly associated with SMB over TCP, not UDP. If Nmap reports that UDP port 445 is open on a host, that is exactly what the command is testing for.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy