How do you feed Nmap with a list of targets using -iL, and what advantages does it provide?

Study for the Nmap/ZenMap Switches Test. Prepare with flashcards and multiple choice questions, each question provides hints and explanations. Get ready for your exam!

Multiple Choice

How do you feed Nmap with a list of targets using -iL, and what advantages does it provide?

Explanation:
Feeding Nmap with a list of targets using -iL is about telling Nmap to pull its targets from a file instead of listing them on the command line. You place one target per line in a text file and pass that file to Nmap with -iL <filename>. Nmap reads the file and processes each non-empty line as a target, stopping at the end of the file. This approach is powerful because it scales to large scans, keeps input organized, and makes automation easy. You can build or generate the list with other tools, reuse it across runs, and combine it with other options (like -p for ports or -sV for service version guessing) without retyping targets. Targets can be IP addresses, hostnames, or networks in CIDR notation, and you can include comments with lines starting with # or have blank lines that Nmap simply skips. The other choices don’t fit because -iL is not just about specifying individual IPs on the command line, nor is it a feature that prints target names. Its primary role is to read targets from a file, one per line, for batch scanning.

Feeding Nmap with a list of targets using -iL is about telling Nmap to pull its targets from a file instead of listing them on the command line. You place one target per line in a text file and pass that file to Nmap with -iL . Nmap reads the file and processes each non-empty line as a target, stopping at the end of the file.

This approach is powerful because it scales to large scans, keeps input organized, and makes automation easy. You can build or generate the list with other tools, reuse it across runs, and combine it with other options (like -p for ports or -sV for service version guessing) without retyping targets. Targets can be IP addresses, hostnames, or networks in CIDR notation, and you can include comments with lines starting with # or have blank lines that Nmap simply skips.

The other choices don’t fit because -iL is not just about specifying individual IPs on the command line, nor is it a feature that prints target names. Its primary role is to read targets from a file, one per line, for batch scanning.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy