Company policy requires that all unsupported operating systems be removed from the network. The security
administrator is using a combination of network based tools to identify such systems for the purpose of
disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be
used to help the security administrator make an approximate determination of the operating system in use on
the local company network? (Select THREE).
A.
Passive banner grabbing
B.
Password cracker
C.
http://www.company.org/documents_private/index.php?search=string#&topic=windows&tcp=packet%
20capture&cookie=wokdjwalkjcnie61lkasdf2aliser4
D.
443/tcp open http
E.
dig host.company.com
F.
09:18:16.262743 IP (tos 0x0, ttl 64, id 9870, offset 0, flags [none], proto TCP (6), length 40)
192.168.1.3.1051 > 10.46.3.7.80: Flags [none], cksum 0x1800 (correct), win 512, length 0
G.
Nmap