Active reconnaissance is a phase of ethical hacking in which information is gathered bydirectly interacting with the target system. This makes option C the correct answer. Unlike passive reconnaissance, active reconnaissance involves sending requests, probes, or packets to the target to elicit responses that reveal useful technical details.
Common active reconnaissance techniques includeport scanning,service enumeration,banner grabbing,DNS queries, andnetwork mapping. These methods help ethical hackers identify open ports, running services, operating systems, and potential vulnerabilities. Active reconnaissance is typically conducted after passive techniques have provided initial intelligence.
Option A is incorrect because recognizing a target without action does not describe reconnaissance behavior. Option B is also incorrect because observing without interaction definespassive reconnaissance, not active reconnaissance.
From an ethical hacking perspective, active reconnaissance is more intrusive and therefore more likely to be detected by intrusion detection systems or firewalls. Because of this, it must always be performed withexplicit authorization. Despite the increased risk of detection, active reconnaissance provides far more accurate and actionable information, making it essential for effective penetration testing.
Understanding the distinction between active and passive reconnaissance helps security professionals choose the correct techniques based on scope, authorization, and risk tolerance. Properly managed, active reconnaissance enables organizations to identify weaknesses early and strengthen their defensive security posture.