63.9k views
0 votes
After Kristen received a copy of an nmap scan run by a penetration tester that her company hired, she knows that the tester used the -O flag. What type of information should she expect to see included in the output other than open ports?

A. OCMP status
B. Other ports
C. Objective port assessment data in verbose mode
D. Operating system and Common Platform Enumeration (CPE) data

1 Answer

6 votes

Final answer:

Kristen should expect to see Operating system and Common Platform Enumeration (CPE) data included in the nmap scan output when the -O flag is used, as it enables OS detection.

Step-by-step explanation:

When the nmap scan is run with the -O flag, it attempts to identify the operating systems running on the target machines. Therefore, Kristen should expect to see Operating system and Common Platform Enumeration (CPE) data included in the nmap scan output. CPE is a structured naming scheme for information technology systems, software, and packages. The -O flag enables OS detection, which uses a combination of TCP/IP stack fingerprinting and various other techniques to determine the operating system of the target host.

User Ngryman
by
8.7k points