in Education by
There are ______ subtypes of reconnaissance. (a) 2 (b) 3 (c) 4 (d) 5 This question was addressed to me in an online interview. My doubt is from Generic Steps for Security topic in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (a) 2 Easy explanation: Reconnaissance can be done in two different ways. 1^st, Active Reconnaissance which involves interacting with the target user or system directly in order to gain information; 2^nd, Passive Reconnaissance, where information gathering from target user is done indirectly without interacting with the target user or system.

Related questions

0 votes
    Which of the following is not a reconnaissance tool or technique for information gathering? (a) Hping (b) NMAP (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of active reconnaissance? (a) Searching public records (b) Telephone calls as ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of passive reconnaissance? (a) Telephonic calls to target victim (b) Attacker ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    There are ______ major types of ports in computers. (a) 1 (b) 2 (c) 3 (d) 4 This question was addressed ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are ______ types of firewall. (a) 5 (b) 4 (c) 3 (d) 2 I had been asked this question in a job ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are ______ types of DoS attack. (a) 2 (b) 3 (c) 4 (d) 5 The question was posed to me ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    There are ______ types of reverse engineering methodologies. (a) 6 (b) 2 (c) 5 (d) 3 I had been ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ______ is the term used for toolkits that are purchased and used for targeting different exploits. (a) Exploit bag ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ (a) Cyber-crime ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ______ means the protection of data from modification by unknown users. (a) Confidentiality (b) Integrity (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ______ is the latest technology that faces an extra challenge because of CIA paradigm. (a) Big data (b) Database ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When you book online tickets by swiping your card, the details of the card gets stored in ______ (a) database ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...