Question: ________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.

Options

A : Footprinting

B : Cyber-printing

C : OS fingerprinting

D : OS penetration testing

Click to view Correct Answer

Previous || Next

Cyber Security Fingerprinting more questions

Which of the below is used to make a line....

D.P.C (Damp Proof Course) is mainly laid on:

Which would be an appropriate method to detect the core....

For discovering the OS running on the target system, the....

You wanted to study the assembly of preinitiation complex in....

Which of the following isn’t a loop statement?

Which of the following is an exit-controlled loop?

What is an example of iteration in C?

Which of the following is an entry-controlled loop?

Which for loop has range of similar indexes of ‘i’....

Chemical Engineering Basics - Part 1 more Online Exam Quiz

Cyber Security Email Security 1

Cyber Security Entrance Exams

Cyber Security Ethics Ethical Hacking

Cyber Security Experienced

Cyber Security Exploits Exploitation

Cyber Security Firewalls 1

Cyber Security Freshers

Cyber Security Generic Steps Security 1

Cyber Security Hacking Security Skills

Cyber Security Hacking Terminologies 1