Que: By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely. a. True b. False c. May be True or False d. Can’t say Answer: True