Which of the following tools can be used for passive OS fingerprinting?

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. Which of the following tools can be used for passive OS fingerprinting?
A. nmap
B. ping
C. tracert
D. tcpdump

EC-Council Certified Ethical Hacker v11

Free dumps for 312-50v11 in Printable PDF format.

High quality PDF and software. VALID exam to help you pass.

Download Printable PDF. VALID exam to help you PASS.

9 thoughts on “Which of the following tools can be used for passive OS fingerprinting?

  1. D.
    Because ICMP request would be registered in logs
    Nmap is anyway an active scanning tool
    Tracert uses ICMP protocol to find the hops,
    SO by method of elimination answer has to be
    D

  2. A, B and C are issuing packets and may studying the response to guess the OS.
    Only D is sniffing the network traffic without sending packets.

    Thus, D is the correct answer.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.