____________ is the information gathering phase in ethical hacking from the target user.
(a) Reconnaissance
(b) Scanning
(c) Gaining access
(d) Maintaining access
This question was addressed to me in my homework.
This intriguing question originated from Generic Steps for Security topic in portion Cyber Security of Cyber Security