New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSAv10 Exam - Topic 3 Question 5 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 5
Topic #: 3
[All ECSAv10 Questions]

The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.

Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Miles
4 months ago
Pseudonymous? That's a new one for me!
upvoted 0 times
...
Kendra
4 months ago
Really? I didn't know it was called that. Sounds a bit off.
upvoted 0 times
...
Dino
4 months ago
Yeah, social engineering is all about being active!
upvoted 0 times
...
Carisa
4 months ago
I thought it was Open Source Gathering, but I guess not.
upvoted 0 times
...
Adaline
5 months ago
Definitely Active Information Gathering!
upvoted 0 times
...
Chandra
5 months ago
I feel like I might confuse Active with Open Source; they both seem related to gathering info, but I can't recall the specifics.
upvoted 0 times
...
Barabara
5 months ago
This question reminds me of a practice test where we discussed the differences between active and passive gathering techniques.
upvoted 0 times
...
Judy
5 months ago
I'm not entirely sure, but I remember something about social engineering being linked to active methods.
upvoted 0 times
...
Reena
5 months ago
I think the answer might be Active Information Gathering since it involves direct interaction with people.
upvoted 0 times
...
Emiko
5 months ago
Hmm, this seems pretty straightforward. I'll just need to double-check the dimensions of the server to confirm if it's a 2U rack server.
upvoted 0 times
...
Caprice
5 months ago
Ah, I remember learning about these types of fraud schemes in class. I'm pretty confident the answer is C - Voucher handling. That's where the employee creates fake vouchers to steal from the company.
upvoted 0 times
...
Jamey
5 months ago
Hmm, I'm a bit unsure about this one. The options seem similar, but I'll re-read the question carefully and try to identify the primary division.
upvoted 0 times
...
Frederica
5 months ago
I studied that the written representation must cover misstatements that the auditor has identified—so it has to be either A or B, but I'm leaning towards A.
upvoted 0 times
...

Save Cancel