Question: ________________ is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer.
Options
A : Footprinting
B : Cyber-printing
C : OS fingerprinting
D : OS penetration testing
Click to view Correct Answer
Cyber Security Fingerprinting more questions
Which of the below is used to make a line....
D.P.C (Damp Proof Course) is mainly laid on:
Which would be an appropriate method to detect the core....
For discovering the OS running on the target system, the....
You wanted to study the assembly of preinitiation complex in....
Which of the following isn’t a loop statement?
Which of the following is an exit-controlled loop?
What is an example of iteration in C?
Which of the following is an entry-controlled loop?
Which for loop has range of similar indexes of ‘i’....
Chemical Engineering Basics - Part 1 more Online Exam Quiz
Cyber Security Email Security 1
Cyber Security Ethics Ethical Hacking
Cyber Security Exploits Exploitation
Cyber Security Generic Steps Security 1