A. Enumeration
b. Scanning
c. Foot-printing
d. None, as the attacker must connect to accomplish all three.
b. Scanning
c. Foot-printing
d. None, as the attacker must connect to accomplish all three.