| The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system
Choose the correct option from below list
(1)Vulnerability Analysis
(2)Fingerprinting
(3)Reconnaissance
(4)Social Engineering
Answer:-(2)Fingerprinting | | |