Certified Ethical Hacker – CEH – 312-50 – Question506

Which of the following Nmap commands would be used to perform a stack fingerprinting?


A.
Nmap -O -p80 <host(s.>
B. Nmap -hU -Q<host(s.>
C. Nmap -sT -p <host(s.>
D. Nmap -u -o -w2 <host>
E. Nmap -sS -0p targe

Correct Answer: B