GIAC Open Source Intelligence Certification 온라인 연습
최종 업데이트 시간: 2025년12월31일
당신은 온라인 연습 문제를 통해 GIAC GOSI 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 GOSI 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 97개의 시험 문제와 답을 포함하십시오.
/ 3
Question No : 1
What is a primary risk of automating data collection in OSINT?
정답:
Question No : 2
Why is it important to analyze metadata in OSINT investigations?
정답:
Question No : 3
Which tools are commonly used for automating OSINT data collection? (Choose two)
정답:
Question No : 4
A researcher wants to find publicly available images of an individual using AI-powered facial recognition.
Which tool is most suitable?
정답:
Question No : 5
Which tool is commonly used for automating OSINT collection?
정답:
Question No : 6
Scenario: A cybersecurity team is conducting OSINT research on a business and finds company-related leaked credentials on a dark web forum.
What should be the next step?
정답:
Question No : 7
What free service allows OSINT analysts to check historical screenshots of websites?
정답:
Question No : 8
Which of the following is a widely used certificate transparency monitoring tool for discovering newly issued or suspicious SSL/TLS certificates?
정답:
Question No : 9
What techniques can OSINT investigators use to map out an organization’s infrastructure? (Choose two)
정답:
Question No : 10
What is a major privacy risk for individuals sharing their phone number online?
정답:
Question No : 11
A company suspects one of its subdomains was taken over by an attacker.
How can an OSINT professional verify this?
정답:
Question No : 12
When performing OSINT on an individual, what online sources are commonly used to verify employment history? (Choose two)
정답:
Question No : 13
When investigating a target’s email address, which of the following OSINT techniques can reveal linked online accounts?
정답:
Question No : 14
You are conducting OSINT research on a company's online exposure.
What should be your first step?
정답:
Question No : 15
Why is sandboxing recommended when analyzing potentially malicious files?