A hacker issued a command and received the following response:
Which of the following describes what the hacker is attempting?
A. Penetrating the system
B. Performing a zombie scan
C. OS fingerprinting
D. Topology discovery
CS0-002: CompTIA CySA+ ExamFULL Printable PDF and Software. VALID exam to help you PASS. |
C.
nmap -O generates an OS fingerprinting. You can see he used that command from OS cpe:/o:linux:linux
https://nmap.org/book/osdetect-usage.html