MCQOPTIONS
Saved Bookmarks
| 1. |
By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the operating system remotely. |
| A. | True |
| B. | False |
| Answer» B. False | |