If Sara, an attacker, is attempting to determine the operating system using banner information, which of the following techniques could she be using?
A. Whois lookup
B. nslookup
C. Port scanning
D. Fingerprinting
Answer: D. Fingerprinting
Computer Science & Information Technology
You might also like to view...
Queue: Consider the following mechanism to handle the wraparound for front. Do they all work? If so, what do you think of them as implementations?
``` a. front = ( front == capacity ) ? 0 : front++; b. front = front++ % capacity; ```
Computer Science & Information Technology
_______________ uses a technique that aims to make a website more highly-ranked by search engines.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology