Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system.
A.
Sequence Verifier
B.
Initial sequence number
C.
Address spoofing
D.
Time to Live
E.
IP ID field
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system.
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system.
A.
Sequence Verifier
B.
Initial sequence number
C.
Address spoofing
D.
Time to Live
E.
IP ID field