in Education by
Which of the following is an example of active reconnaissance? (a) Searching public records (b) Telephone calls as a help desk or fake customer care person (c) Looking for the target’s details in the database (d) Searching the target’s details in paper files I got this question during an interview for a job. Origin of the question is Generic Steps for Security in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (b) Telephone calls as a help desk or fake customer care person The best explanation: As active reconnaissance is all about interacting with target victim directly, hence telephonic calls as a legitimate customer care person or help desk person, the attacker can get more information about the target user.

Related questions

0 votes
    Which of the following is an example of passive reconnaissance? (a) Telephonic calls to target victim (b) Attacker ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a reconnaissance tool or technique for information gathering? (a) Hping (b) NMAP (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    There are ______ subtypes of reconnaissance. (a) 2 (b) 3 (c) 4 (d) 5 This question was addressed to me in ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following case comes under victims' list of an active online attack? (a) Strong password based ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In an _________________ attack, an attacker finds an active session & takes over that session. (a) network ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of social engineering? (a) Dumpster diving (b) Shoulder surfing (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of a computer as weapon cyber-crime? (a) Credit card fraudulent (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) MAC Address Spoofing (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of network layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) Physical Theft of Data (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of presentation layer issues? (a) Poor handling of unexpected input can ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of Transport layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...