Skip to content

Latest commit

 

History

History
8 lines (6 loc) · 302 Bytes

File metadata and controls

8 lines (6 loc) · 302 Bytes

11. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?

  • Operating System fingerprinting
  • Operating System penetration testing
  • Digital-printing
  • Machine printing

**ANSWER HERE : Operating System fingerprinting