OSINT

OSINT

University

10 Qs

quiz-placeholder

Similar activities

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Computer Security - Internet Vulnerabilities

Computer Security - Internet Vulnerabilities

University

15 Qs

Explotación manual y automatizada

Explotación manual y automatizada

University

5 Qs

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

Introduction to AI and Microsoft Azure Cognitive Services

Introduction to AI and Microsoft Azure Cognitive Services

University

10 Qs

Business Intelligence Quiz - 1

Business Intelligence Quiz - 1

University - Professional Development

10 Qs

Cybersecurty Concepts

Cybersecurty Concepts

University

10 Qs

ITLM - Data Sanitization and Asset Disposal

ITLM - Data Sanitization and Asset Disposal

University

5 Qs

OSINT

OSINT

Assessment

Quiz

Computers

University

Hard

Created by

PICT CyberCell

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What does OSINT stand for in cybersecurity?

Open Secure Internet Networking

Open Source Intelligence

Operational System Intelligence Network

Online Source Information Network

2.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Which of the following is NOT a typical source used in OSINT?

Public databases

  • Social media platforms

Internal company emails

News articles

3.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Which of the following is a key goal of OSINT in cybersecurity?

Encrypting sensitive information

Penetrating secured networks

Developing new software

Gathering publicly available data

4.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What is a common use of OSINT in cybersecurity?

Discovering hidden encryption keys

Building firewalls

Identifying vulnerabilities in public-facing systems

Configuring internal servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

In OSINT investigations, what is the significance of "pivoting" when gathering intelligence?

Switching between multiple public sources simultaneously

Using one piece of information (e.g., IP address) to discover new related information

Cross-referencing closed and open sources for verification

Rotating between different intelligence-gathering methods

6.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Which of the following is a legal and ethical concern related to OSINT?

Scanning public websites for data leaks

Accessing restricted government data

Scraping social media profiles

Monitoring corporate websites for job postings

7.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What is the significance of "metadata analysis" in OSINT?

Extracting hidden details from digital files such as documents or images

Encrypting communication to prevent data leaks

Analyzing website traffic for vulnerabilities

Securing databases from unauthorized access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?