Correct answer is (b) Passive fingerprinting
The best explanation: Passive fingerprinting is dependent on the sniffing traces from any remote system. Depending on the sniffing traces done by tools like Wireshark, attackers can establish and verify the OS of the remote host.