Sara, a security analyst, discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did Sara use?
A. Active fingerprinting
B. Passive fingerprinting
C. Protocol analyzing
D. Network enumerating
Answer: B. Passive fingerprinting
You might also like to view...
What is the process for removing an outer border on a table?
What will be an ideal response?
A program called PowerPoint Presenter displays presentations on computers on which PowerPoint is not installed.
Answer the following statement true (T) or false (F)
There are a number of different types of ____________________robots used by the U.S. military to investigate locations before soldiers enter them and make sure the locations are safe, for example.
Fill in the blank(s) with the appropriate word(s).
Microsoft’s ________ is a cloud computing platform that allows you to develop, manage and distribute your apps in the cloud.
a) Common Language Runtime b) Windows Azure c) virtual machine d) Windows 8