in Education by
_______________________ is gained if you send especially skilled packets to a target machine. (a) Active fingerprinting (b) Passive fingerprinting (c) OS fingerprinting (d) Network fingerprinting This question was addressed to me in an online interview. Asked question is from Fingerprinting topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct answer is (a) Active fingerprinting To elaborate: Active fingerprinting is gained if you send especially skilled packets to a target machine and then listing down its replies and analyzing the information gathered for determining the target OS.

Related questions

0 votes
    Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets. (a) True (b) False ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    Governments hired some highly skilled hackers. These types of hackers are termed as _______ (a) Special Hackers (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______________________ is based on sniffer traces from the remote system. (a) Active fingerprinting (b) Passive fingerprinting ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Firewalk works by sending ________ & ________ packets. (a) UDP, HTTP (b) TCP, HTTP (c) ICMP, TCP (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS). ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack segment. (a ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ____________ is the information gathering phase in ethical hacking from the target user. (a) Reconnaissance (b) Scanning ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...