From the listing of attacks, which analyzes how the operating system (OS) responds to specific
network traffic, in an attempt to determine the operating system running in your networking
environment?
A.
Reverse engineering.
B.
Host hijacking.
C.
Fingerprinting
D.
Operating system scanning.
Explanation:
Fingerprinting is the act of inspecting returned information from a server ( ie . One method is ICMP
Message quoting where the ICMP quotes back part of the original message with every ICMP error
message. Each operating system will quote definite amount of message to the ICMP error
messages. The peculiarity in the error messages received from various types of operating systems
helps us in identifying the remote host’s OS.