

MCQOPTIONS
Saved Bookmarks
1. |
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely. |
A. | True |
B. | False |
Answer» B. False | |