Sara, a security analyst, discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did Sara use?

A. Active fingerprinting
B. Passive fingerprinting
C. Protocol analyzing
D. Network enumerating


Answer: B. Passive fingerprinting

Computer Science & Information Technology

You might also like to view...

What is the process for removing an outer border on a table?

What will be an ideal response?

Computer Science & Information Technology

A program called PowerPoint Presenter displays presentations on computers on which PowerPoint is not installed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

There are a number of different types of ____________________robots used by the U.S. military to investigate locations before soldiers enter them and make sure the locations are safe, for example.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Microsoft’s ________ is a cloud computing platform that allows you to develop, manage and distribute your apps in the cloud.

a) Common Language Runtime b) Windows Azure c) virtual machine d) Windows 8

Computer Science & Information Technology