Attackers use information collected through ________ to identify vulnerabilities or weak points in system security.
A. enumeration
B. networking
C. footprinting
D. forensics
Answer: A. enumeration
Computer Science & Information Technology