Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Cat Exam

 :) Latest Topic
AJAX
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
general knowledge
 ASP.NET
 :) Hot Jobs
 
 :) Latest Articles


  

 
CreamKids


The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system
Question Posted on 16 Jul 2021

Home >> Important Topics >> Security Assessment >> The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system




The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system
Choose the correct option from below list
(1)Vulnerability Analysis
(2)Fingerprinting
(3)Reconnaissance
(4)Social Engineering

Answer:-(2)Fingerprinting
0
0



 
 Input Your Comments Or suggestions(If Any)
 Name
 Email(optional)
 Comments


Other Important Questions
Which of the following is typically used by threat actors/security analysts trying to determine the security posture of externally accessible assets?
Which of the following assessment type works to determine whether a threat made/detected, is genuine?
Which among the following involves evaluating security against a standard to check for complaince?
Which of the following is best used for penetration testing?
The type of vulnerability scan that facilitates access to low-level data.






 
Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |