Osint MCQS
Osint MCQS
Osint MCQS
1. Question: Which of the following is NOT considered a primary source for OSINT?
A) Social media platforms
B) Government websites
C) News articles
D) Private email correspondence
Answer: D) Private email correspondence
2. Question: What is the primary purpose of OSINT?
A) To gather intelligence from classified government sources
B) To conduct covert operations to obtain sensitive information
C) To analyze publicly available information to gather intelligence
D) To hack into private networks to extract data
Answer: C) To analyze publicly available information to gather intelligence
3. Question: Which of the following is an example of passive OSINT collection?
A) Conducting interviews with key individuals
B) Monitoring public social media posts
C) Covertly infiltrating a secure facility
D) Intercepting encrypted communications
Answer: B) Monitoring public social media posts
4. Question: When conducting OSINT research, what is a crucial consideration?
A) Utilizing classified government databases
B) Adhering to legal and ethical boundaries
C) Employing covert surveillance techniques
D) Using encryption to protect gathered data
Answer: B) Adhering to legal and ethical boundaries
5. Question: Which of the following is an example of active OSINT collection?
A) Reviewing publicly available news articles
B) Engaging with individuals on social media to gather information
C) Monitoring publicly accessible webcams
D) Analyzing satellite imagery
Answer: B) Engaging with individuals on social media to gather information
6. Question: What term describes the process of verifying the accuracy and reliability of OSINT
data?
A) Data manipulation
B) Source validation
C) Intelligence gathering
D) Reconnaissance
Answer: B) Source validation
7. Question: Which of the following is NOT a common OSINT tool or resource?
A) Google Search
B) Shodan
C) TOR Network
D) Maltego
Answer: C) TOR Network
8. Question: What is the purpose of using TOR (The Onion Router) in OSINT?
A) To hide the identity of the OSINT analyst
B) To conduct anonymous web searches
C) To access classified government databases
D) To perform targeted cyberattacks
Answer: B) To conduct anonymous web searches
9. Question: Which of the following is an example of geospatial OSINT?
A) Monitoring social media for mentions of specific keywords
B) Analyzing satellite imagery to identify military installations
C) Tracking internet traffic to identify potential threats
D) Examining financial records to trace illicit funds
Answer: B) Analyzing satellite imagery to identify military installations
10. Question: What is the role of metadata in OSINT?
A) To provide context for gathered information
B) To hide sensitive information within digital files
C) To track the origin of online communications
D) To encrypt data transmitted over the internet
Answer: C) To track the origin of online communications