A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company.
What phase of security testing would your team jump in right away?
A . Scanning
B . Reconnaissance
C . Escalation
D . Enumeration
Answer: B