Find expert advice and community support for all your questions on IDNLearn.com. Discover detailed answers to your questions with our extensive database of expert knowledge.

This type of attack is also known as footprinting, or mapping, the network. This includes collecting information about a network that will be the target of an attack.
a) Stealth attack
b) Active attack
c) Passive attack
d) Network attack