On a remote machine, which action will you usually take to determine the operating system?
A.
MAC flooding
B.
System fingerprinting
C.
DNS spoofing
D.
Privilege escalation
On a remote machine, which action will you usually take to determine the operating system?
On a remote machine, which action will you usually take to determine the operating system?
A.
MAC flooding
B.
System fingerprinting
C.
DNS spoofing
D.
Privilege escalation