Which input method lets you feed Nmap a list of IPs, subnets, and hostnames one per line?

Study for the Nmap/ZenMap Switches Test. Prepare with flashcards and multiple choice questions, each question provides hints and explanations. Get ready for your exam!

Multiple Choice

Which input method lets you feed Nmap a list of IPs, subnets, and hostnames one per line?

Explanation:
Feeding Nmap targets from a file is how you supply a list of items one per line. This input method accepts IP addresses, CIDR subnets, and DNS hostnames, making it perfect for scanning a prepared list rather than typing everything on the command line. You create a text file with each target on its own line (for example, 192.168.1.1, 10.0.0.0/24, or example.com) and run Nmap with the file as input, such as nmap -iL targets.txt. The other options mentioned tweak how the scan runs or how results are displayed, not how targets are supplied. For instance, one option restricts output to open ports, another disables DNS resolution to speed things up, and another enables traceroute information. These are useful features, but they don’t provide the mechanism for loading a list of targets from a file.

Feeding Nmap targets from a file is how you supply a list of items one per line. This input method accepts IP addresses, CIDR subnets, and DNS hostnames, making it perfect for scanning a prepared list rather than typing everything on the command line. You create a text file with each target on its own line (for example, 192.168.1.1, 10.0.0.0/24, or example.com) and run Nmap with the file as input, such as nmap -iL targets.txt. The other options mentioned tweak how the scan runs or how results are displayed, not how targets are supplied. For instance, one option restricts output to open ports, another disables DNS resolution to speed things up, and another enables traceroute information. These are useful features, but they don’t provide the mechanism for loading a list of targets from a file.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy