Grace would like to determine the operating system running on a system that she is targeting in a penetration test. Which one of the following techniques will most directly provide her with this information?
A. Port scanning
B. Footprinting
C. Vulnerability scanning
D. Packet capture