Reconnaissance Practice

Focus on passive and active information gathering to understand the target before touching production systems.

1. Question

Which activity is the BEST example of passive reconnaissance against a web application?

2. Question

Which of the following tools is MOST associated with open-source intelligence (OSINT) collection?

3. Question

Reviewing SSL/TLS certificates and certificate transparency logs for subdomains primarily supports which goal?

4. Question

Which DNS record type is MOST useful for discovering mail infrastructure during reconnaissance?

5. Question

Why is it important to document the source of each piece of information collected during reconnaissance?

6. Question

Which activity would MOST likely be considered active reconnaissance rather than passive?

7. Question

During reconnaissance, you discover a public S3 bucket containing configuration files. What is the MOST appropriate next step?

8. Question

What is the PRIMARY reason to perform reconnaissance before scanning or exploitation?

9. Question

Which of the following is MOST likely to reveal usernames and email formats during recon?

10. Question

When performing reconnaissance on a target's website, which action is MOST appropriate within a typical web application scope?

Score: 0.0 / 10 (0 of 10 correct)