Asked by ..

When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult.

Which of the following is the proper nmap command used to generate decoys?

answer

nmap -S RND:11 target_IP_address


nmap -D RND:10 target_IP_address


nmap -D RND:01 target_IP_address


nmap -S RND:20 target_IP_address

All Answers 1

Answered by GPT-5 mini AI
nmap -D RND:10 target_IP_address

Explanation: -D enables decoys; RND:10 tells nmap to generate 10 random decoy addresses. (-S is for spoofing the source IP, not decoys.)