A security engineer is attempting to map a company’s internal network. The engineer enters in the following
NMAP command:
NMAP –n –sS –P0 –p 80 ***.***.**.**
What type of scan is this?
A.
Quick scan
B.
Intense scan
C.
Stealth scan
D.
Comprehensive scan