ExamGecko
Question list
Search
Search

Question 34 - ICS-SCADA Cyber Security discussion

Report
Export

Which of the hacking methodology steps can be used to identify the applications and vendors used?

A.
Enumeration
Answers
A.
Enumeration
B.
OSINT
Answers
B.
OSINT
C.
Scanning
Answers
C.
Scanning
D.
Surveillance
Answers
D.
Surveillance
Suggested answer: B

Explanation:

OSINT (Open Source Intelligence) refers to the collection and analysis of information gathered from public, freely available sources to be used in an intelligence context. In the context of hacking methodologies, OSINT can be used to identify applications and vendors employed by a target organization by analyzing publicly available data such as websites, code repositories, social media, and other internet-facing resources.

Reference:

Michael Bazzell, 'Open Source Intelligence Techniques'.

asked 18/09/2024
luis coco enriquez
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first