InterviewSolution
Saved Bookmarks
| 1. |
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.(a) True(b) FalseI have been asked this question in quiz.My question is from Fingerprinting topic in section Cyber Security of Cyber Security |
|
Answer» The correct answer is (a) True |
|