exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 318 discussion

Actual exam question from CompTIA's SY0-701
Question #: 318
Topic #: 1
[All SY0-701 Questions]

Which of the following is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?

  • A. Open-source intelligence
  • B. Port scanning
  • C. Pivoting
  • D. Exploit validation
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
a4e15bd
8 months ago
Selected Answer: A
correct answer if A. OSINT
upvoted 2 times
...
850bc48
8 months ago
Chat GPT: The correct answer is A. Open-source intelligence (OSINT). OSINT is a common passive reconnaissance technique where penetration testers gather information from publicly available sources, such as websites, social media, and databases, without directly interacting with the target systems. This helps them learn more about the target while minimizing the chances of detection. Options B, C, and D involve more active techniques, which usually come later in the penetration testing process: B. Port scanning is an active technique to identify open ports and services on a target. C. Pivoting refers to using a compromised system to gain access to other systems within a network. D. Exploit validation involves testing vulnerabilities to confirm whether they can be successfully exploited.
upvoted 2 times
...
abbey0922
8 months ago
Selected Answer: A
Passive reconnaissance gathers information about the target system without contacting it directly. An open source intelligence (OSINT) investigation can discover publicly available information about the target system. The utility of such information depends on the type of penetration test
upvoted 1 times
...
Cee007
8 months ago
Selected Answer: A
A. Open-source intelligence (OSINT) OSINT involves gathering information from publicly available sources, such as social media, websites, and online databases, without actively interacting with the target system. This technique helps in identifying potential vulnerabilities and understanding the target's environment before more intrusive methods are used.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago