Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following best describes the phase where an attacker engages in network surveillance?

  1. Reconnaissance

  2. Exploitation

  3. Delivery

  4. Action on objectives

The correct answer is: Reconnaissance

The phase where an attacker engages in network surveillance is best described as reconnaissance. This initial stage of an attack involves gathering information about a target before launching any actual attacks. During reconnaissance, an attacker may use various techniques to map out network infrastructure, identify active devices, discover open ports, and gather details about system configurations. The primary goal is to collect as much relevant information as possible, which can aid in planning subsequent attack strategies. Gathering intelligence at this stage can include both passive and active methods. Passive methods may involve analyzing publicly available information such as social media, company websites, or open-source intelligence databases. Active methods could include scanning the network to identify live hosts and services running, which could help the attacker understand potential vulnerabilities. This phase is critical because it sets the foundation for the attacker's efforts to exploit weaknesses in the target’s systems later on. Understanding the reconnaissance phase helps students appreciate the importance of network security measures designed to detect and prevent such information gathering activities.