Cyber Recon & Scanning Trivia GameOnline version Test your knowledge of cyber reconnaissance and scanning techniques in this engaging trivia game. Players will be challenged with various nouns related to cybersecurity, where they must determine whether each term is relevant to the world of cyber recon and scanning. Can you identify the key concepts and tools used in the field? by A 1 DNS lookup is not related to cybersecurity. Yes No 2 Active reconnaissance is done without any interaction with the target. Yes No 3 Vulnerability scanning is unnecessary for system maintenance. Yes No 4 Vulnerability scanning helps identify weaknesses in a system. Yes No 5 Phishing is a common method used in social engineering attacks. Yes No 6 Host enumeration is a technique used to identify active devices on a network. Yes No 7 Active reconnaissance involves sending out probes to elicit a response from a target system. Yes No 8 Social media is not a reliable source for gathering information. Yes No 9 Phishing is a method used to secure sensitive information. Yes No 10 OSINT gathering utilizes publicly available information for intelligence. Yes No 11 Cybersecurity is solely focused on physical security measures. Yes No 12 Social media can be a source of information for reconnaissance. Yes No 13 DNS lookup is a method used to resolve domain names to IP addresses. Yes No 14 Stealth scans are illegal and should not be used. Yes No 15 Host enumeration is irrelevant in cybersecurity. Yes No 16 Stealth scans are designed to avoid detection by the target system. Yes No 17 Passive reconnaissance requires direct access to the target system. Yes No 18 OSINT gathering only includes classified information. Yes No 19 Cybersecurity involves protecting systems from unauthorized access. Yes No 20 Passive reconnaissance allows information gathering without directly interacting with the target. Yes No