Reconnaissance Practice
Focus on passive and active information gathering to understand the target before touching production systems.
1. Question
Which activity is the BEST example of passive reconnaissance against a web application?
2. Question
Which of the following tools is MOST associated with open-source intelligence (OSINT) collection?
3. Question
Reviewing SSL/TLS certificates and certificate transparency logs for subdomains primarily supports which goal?
4. Question
Which DNS record type is MOST useful for discovering mail infrastructure during reconnaissance?
5. Question
Why is it important to document the source of each piece of information collected during reconnaissance?
6. Question
Which activity would MOST likely be considered active reconnaissance rather than passive?
7. Question
During reconnaissance, you discover a public S3 bucket containing configuration files. What is the MOST appropriate next step?
8. Question
What is the PRIMARY reason to perform reconnaissance before scanning or exploitation?
9. Question
Which of the following is MOST likely to reveal usernames and email formats during recon?
10. Question
When performing reconnaissance on a target's website, which action is MOST appropriate within a typical web application scope?