Que: By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.

a. True
b. False
c. May be True or False
d. Can’t say
Answer: True

Leave a Comment

Get code60