Zone transfer Resource records Resource transfer DNSSEC admin See author's posts Post navigation What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response? Jimmy is standing outside a secure entrance to a facility. He is pretending to having a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close. What just happened?