If Sara, an attacker, is attempting to determine the operating system using banner information, which of the following techniques could she be using?

A. Whois lookup
B. nslookup
C. Port scanning
D. Fingerprinting

Answer: D. Fingerprinting

Computer Science & Information Technology

You might also like to view...

Queue: Consider the following mechanism to handle the wraparound for front. Do they all work? If so, what do you think of them as implementations?

``` a. front = ( front == capacity ) ? 0 : front++; b. front = front++ % capacity; ```

Computer Science & Information Technology

_______________ uses a technique that aims to make a website more highly-ranked by search engines.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology