How is open-source intelligence (OSINT) gathering typically implemented during a penetration test?

IT Questions BankCategory: Ethical HackerHow is open-source intelligence (OSINT) gathering typically implemented during a penetration test?

How is open-source intelligence (OSINT) gathering typically implemented during a penetration test?

  • by using public internet searches
  • by installing and running the OSINT API
  • by sending phishing emails
  • by using nmap for web page and web application enumerations

Explanation: Open-source intelligence (OSINT) gathering uses publicly available intelligence sources, such as Internet searches, to collect and analyze information about a target.

Exam with this question: 3.5.3 Quiz - Information Gathering and Vulnerability Scanning Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments