1.

By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely.

A. True
B. False
Answer» B. False


Discussion

No Comment Found