• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

How is open-source intelligence (OSINT) gathering typically implemented during a penetration test?

  • by using public internet searches 
  • by installing and running the OSINT API 
  • by sending phishing emails 
  • by using nmap for web page and web application enumerations

Explanation & Hint:

Open-source intelligence (OSINT) gathering uses publicly available intelligence sources, such as Internet searches, to collect and analyze information about a target.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments