A company recently hired your team of Ethical Hackers to test the security of their network systems. The
company wants to have the attack be as realistic as possible. They did not provide any information besides the
name of their company. What phase of security testing would your team jump in right away?
A.
Scanning
B.
Reconnaissance
C.
Escalation
D.
Enumeration
B