Which of the following Nmap commands helped Jim retrieve the required information?
Jim, a professional hacker, attacked a company that manages crucial industrial infrastructure. Jim used Nmap to scan open ports and services operating on servers linked to the organization's OT network. He utilized the Nmap command to locate Ethernet/IP devices connected to the Internet and obtained further information such as the vendor name, product code and name, device name, and IP address.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >