Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack?
A. Vulnerability analysis
B. Malware analysis
C. Scanning networks
D. Enumeration
A. Vulnerability analysis
B. Malware analysis
C. Scanning networks
D. Enumeration