During which step of the attacker's methodology, in-depth information about the target, such as user accounts and open shares, is collected?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: B
Computer Science & Information Technology