_______________________ is based on sniffer traces from the remote system.
(a) Active fingerprinting
(b) Passive fingerprinting
(c) OS fingerprinting
(d) Network fingerprinting
I got this question during an interview for a job.
I need to ask this question from Fingerprinting topic in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,