Which flag would you use to perform operating system detection via TCP/IP fingerprinting?

Study for the Nmap/ZenMap Switches Test. Prepare with flashcards and multiple choice questions, each question provides hints and explanations. Get ready for your exam!

Multiple Choice

Which flag would you use to perform operating system detection via TCP/IP fingerprinting?

Explanation:
OS detection via TCP/IP fingerprinting works by sending crafted probes and analyzing how the target responds—looking at patterns like TTL, window size, TCP options, and acknowledgment behavior to infer the operating system. In Nmap, this capability is enabled with the -O flag, which activates TCP/IP fingerprinting and matches the observed response patterns against known OS fingerprints. The other options serve different purposes: -sV focuses on service and version detection, -F performs a fast scan, and -p- scans all ports. Therefore, to perform operating system detection via TCP/IP fingerprinting, you would use the -O flag.

OS detection via TCP/IP fingerprinting works by sending crafted probes and analyzing how the target responds—looking at patterns like TTL, window size, TCP options, and acknowledgment behavior to infer the operating system. In Nmap, this capability is enabled with the -O flag, which activates TCP/IP fingerprinting and matches the observed response patterns against known OS fingerprints. The other options serve different purposes: -sV focuses on service and version detection, -F performs a fast scan, and -p- scans all ports. Therefore, to perform operating system detection via TCP/IP fingerprinting, you would use the -O flag.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy