Looking for trustworthy answers? Westonci.ca is the ultimate Q&A platform where experts share their knowledge on various topics. Our platform provides a seamless experience for finding reliable answers from a network of experienced professionals. Explore comprehensive solutions to your questions from a wide range of professionals on our user-friendly platform.

This type of attack is also known as footprinting, or mapping, the network. This includes collecting information about a network that will be the target of an attack.
a) Stealth attack
b) Active attack
c) Passive attack
d) Network attack