__________________is a computing action used in which usernames & info about user-groups, shares as well as services of networked computers can be regained.
(a) Hardware enumeration
(b) System enumeration
(c) Network enumeration
(d) Cloud enumeration
I got this question in an interview for job.
The query is from Enumerating in Cyber Security topic in section Cyber Security of Cyber Security