This is a dedicated watch page for a single video.
Malcolm, a malicious actor, is gearing up to target the network of a financial institution. To accomplish this, he aims to gather information about the operating systems employed on the company's computers. Which of the following techniques will Malcolm employ to achieve his intended outcome?