Exam 200-201 Question id=6088 Network intrusion analysis

Refer to the exhibit.

PS C:\Program Files (x86)\Nmap> nmap --top-ports 5 172.31.45.240 Starting Nmap 7.80 (https://nmap.org) at 2019-11-22 22:05 Coordinated Universal Time Nnap scan report for ip-172-31-45-240.us-west-2.compute.internal (172.31.45.240) PORT STATE SERVICE 21/tcp closed ftp 22/sctp closed ssh 23/tcp closed telnet 80/tcp closed http 443/tcp closed https Nmap done: 1. IP address (1 host up) scanned in 0.19 seconds. Ps C:\Program Files (x86)\Nmap> nmap --top-ports 10 172.31.45.240 Starting Nmap 7.80 (https://nmap.org) at 2019-11-22 22:05 Coordinated Universal Time Nmap scan report for ip-172-31-45-240.us-west-2.compute.internal (172.31.45.240) Host is up (0.00s latency). PORT STATE SERVICE 21/tcp closed ftp 22/tcp closed ssh 23/tcp closed telnet 25/tcp closed smtp 80/tcp closed http 110/tcp closed pop3 139/tcp open netbios-ssn 443/tcp closed https 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server Nmap done: 1. IP address (1 host up) scanned in 0.19 seconds PS C:\Program Files (x86)\Nmap>

What does this output indicate?

A. HTTPS ports are open on the server.
B. SMB ports are closed on the server.
C. FTP ports are open on the server.
D. Email ports are closed on the server.

WARNING

the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...
Subject:

only logged users can write comments