OSINT Certification Exam study
Questions All with 100% Correct
Verified Answers
Four Distinct Categories - Answer News and media, gray literature, long-form social
media content, short-form social media content
New and Media subtype - Answer websites, journalism
Gray Literature - Answer non-media institutions and organizations, both public and
private
Long-Form social media content - Answer Individual perspective is material that is
very text heavy from a single individual or perhaps even small groups of people
ex. Reddit, blogger, tumblr
Short-form social media content - Answer Individual perspective is material
from platforms like Facebook or twitter that has little intel value
The Intelligence Cycle - Answer Planning and Direction, Collection,
Processing/Exploitation, Production/Analyze, Dissemination/Distribution, and
Evaluation/Feedback
,Planning and Direction - Answer management of the intelligence effort; to
identify, prioritize, and validating requirement to production and monitoring
Collection - Answer Includes acquiring information and provisioning that information
to processing and production elements, Acquired by interviews, surveillance, human
source operations, searches, and liaison relationships; done by different types of
intelligence (SOCINT, IMIN, MASINT, HUMINT, OSINT, GEOINT)
Processing/Exploitation - Answer Conversion of collected information into a form
suitable for the production of intelligence. Incoming information is converted
into formats that can be readily used by intelligence analysts in producing
intelligence, information filtering
Information Filtering - Answer Exploiting imagery,
Decoding messages and translating broadcasts,
Reducing telemetry to meaningful measures,
Preparing information for computer processing, storage and retrieval,
Placing human-source reports into a form and context to make them
more understandable
Production - Answer Process of analyzing, evaluating, interpreting, and integrating
raw data and information into finished intelligence products for known or anticipated
purposes and applications, includes different scenarios and looks for possibilities of
threats/outcomes
Dissemination/Distribution - Answer Intelligence can be provided to the consumer in
a variety of formats including verbal, reports, written reports, imagery, products, and
intelligence databases
PrivacyBager - Answer block all invisible browsers
, Search by image - Answer search all at once
TOR - Answer private VPN, used for dark/deep web, .onion
Hunch.ly - Answer case management system
Search Engine Research - Answer "around waht you want/exact statement", AND/OR,
* (wildcard), $ (prices), Cache:, .pdf/filetype:doc, Site:, Related:, Weather:, Map:
Reverse Image Research - Answer verify fake persona/sockpuppet accounts
Archive Search Engine Research - Answer web.archive.org, view previous version of
a website
Email Addresses - Answer Truemail.io, (validate/search)
Compromised Accounts - Answer haveIbeenpwned.com (details on breaches
Username research - Answer one username could be in another spot: namevine.com,
knowem.com, checkusernames.com, social-searcher.com, lullar-com-3.appspot.com
People Search Engines Research - Answer spokeo.com,
johndoe.com, fastpeoplesearch.com, zabasearch
Telephone Number Research - Answer phone number with quotes in google
search, carrierlookup.com, opencname.com, 411.com, fastpeoplesearch.com