TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. Which of the following tools can be used for passive OS fingerprinting?
A. nmap
B. ping
C. tracert
D. tcpdump
EC-Council Certified Ethical Hacker v11Free dumps for 312-50v11 in Printable PDF format.High quality PDF and software. VALID exam to help you pass. |
I agree , the correct answer is ¨D¨
tracert generate logs , is detectable
D.
Because ICMP request would be registered in logs
Nmap is anyway an active scanning tool
Tracert uses ICMP protocol to find the hops,
SO by method of elimination answer has to be
D
D….
D. tcpdump
The only passive tool here is tcpdump. D!
I agree, correct answer is D. tcpdump
A, B and C are issuing packets and may studying the response to guess the OS.
Only D is sniffing the network traffic without sending packets.
Thus, D is the correct answer.
I agree with AK the correct answer should be D tcpdump
I think correct answer is D. tcpdump