According to the CEH methodology, what is the next step to be performed after footprinting?
A.
Enumeration
B.
Scanning
C.
System Hacking
D.
Social Engineering
E.
Expanding Influence
Explanation:
Once footprinting has been completed, scanning should be attempted next. Scanning should take place on two distinct levels: network and host.
Correct answer is B