Osint MCQS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

OSINT MCQS

1. Question: Which of the following is NOT considered a primary source for OSINT?
 A) Social media platforms
 B) Government websites
 C) News articles
 D) Private email correspondence
Answer: D) Private email correspondence
2. Question: What is the primary purpose of OSINT?
 A) To gather intelligence from classified government sources
 B) To conduct covert operations to obtain sensitive information
 C) To analyze publicly available information to gather intelligence
 D) To hack into private networks to extract data
Answer: C) To analyze publicly available information to gather intelligence
3. Question: Which of the following is an example of passive OSINT collection?
 A) Conducting interviews with key individuals
 B) Monitoring public social media posts
 C) Covertly infiltrating a secure facility
 D) Intercepting encrypted communications
Answer: B) Monitoring public social media posts
4. Question: When conducting OSINT research, what is a crucial consideration?
 A) Utilizing classified government databases
 B) Adhering to legal and ethical boundaries
 C) Employing covert surveillance techniques
 D) Using encryption to protect gathered data
Answer: B) Adhering to legal and ethical boundaries
5. Question: Which of the following is an example of active OSINT collection?
 A) Reviewing publicly available news articles
 B) Engaging with individuals on social media to gather information
 C) Monitoring publicly accessible webcams
 D) Analyzing satellite imagery
Answer: B) Engaging with individuals on social media to gather information
6. Question: What term describes the process of verifying the accuracy and reliability of OSINT
data?
 A) Data manipulation
 B) Source validation
 C) Intelligence gathering
 D) Reconnaissance
Answer: B) Source validation
7. Question: Which of the following is NOT a common OSINT tool or resource?
 A) Google Search
 B) Shodan
 C) TOR Network
 D) Maltego
Answer: C) TOR Network
8. Question: What is the purpose of using TOR (The Onion Router) in OSINT?
 A) To hide the identity of the OSINT analyst
 B) To conduct anonymous web searches
 C) To access classified government databases
 D) To perform targeted cyberattacks
Answer: B) To conduct anonymous web searches
9. Question: Which of the following is an example of geospatial OSINT?
 A) Monitoring social media for mentions of specific keywords
 B) Analyzing satellite imagery to identify military installations
 C) Tracking internet traffic to identify potential threats
 D) Examining financial records to trace illicit funds
Answer: B) Analyzing satellite imagery to identify military installations
10. Question: What is the role of metadata in OSINT?
 A) To provide context for gathered information
 B) To hide sensitive information within digital files
 C) To track the origin of online communications
 D) To encrypt data transmitted over the internet
Answer: C) To track the origin of online communications

You might also like