exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 513 discussion

Actual exam question from CompTIA's SY0-701
Question #: 513
Topic #: 1
[All SY0-701 Questions]

Which of the following activities uses OSINT?

  • A. Social engineering testing
  • B. Data analysis of logs
  • C. Collecting evidence of malicious activity
  • D. Producing IOC for malicious artifacts
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kesha
2 weeks, 5 days ago
Selected Answer: C
OSINT (Open-Source Intelligence) refers to gathering publicly available information from sources like websites, social media, forums, and public records. Collecting evidence of malicious activity often involves analyzing public threat reports, leaked data, or attacker footprints found in open sources.
upvoted 1 times
...
9149f41
2 months, 2 weeks ago
Selected Answer: A
Hacker collect finds the target victim, and it's info in the open sources, eventually attacking. OSINT for Social Engineering Testing: Information Gathering: Employee names from LinkedIn Company structure from websites Email formats from public posts Phone numbers from directories Office locations from Google Maps
upvoted 2 times
...
Anyio
2 months, 3 weeks ago
Selected Answer: A
Answer: A. Social engineering testing Open Source Intelligence (OSINT) involves gathering information from publicly available sources. Social engineering testing often uses OSINT to collect data about individuals or organizations to craft convincing phishing attacks or other social engineering tactics. Why the other options are not correct: C. Collecting evidence of malicious activity Collecting evidence of malicious activity typically involves forensic analysis of compromised systems or networks, which relies on internal data and artifacts rather than publicly available information. D. Producing IOCs for malicious artifacts Producing Indicators of Compromise (IOCs) involves analyzing malware or attack patterns to create signatures or identifiers. This process is based on technical analysis of malicious artifacts, not on publicly available information.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago