Using nmap as you ran it without other parameters will only ping a machine. This isn't the best method for checking open ports, since, among other factors, most pings are dropped or not replied to when used in this way. Also, nmap will not show any vulnerabilities. A better tool would be nessus.
The results I've posted previously are run using nessus with aggressive parameters. This is a better indication of what ports are open and vulnerabilities exist on the box.