Explore Westonci.ca, the premier Q&A site that helps you find precise answers to your questions, no matter the topic. Get immediate and reliable solutions to your questions from a community of experienced experts on our Q&A platform. Join our platform to connect with experts ready to provide precise answers to your questions in different areas.

This type of attack is also known as footprinting, or mapping, the network. This includes collecting information about a network that will be the target of an attack.
a) Stealth attack
b) Active attack
c) Passive attack
d) Network attack