Que: ________ phase in ethical hacking is known as the pre-attack phase.

a. Reconnaissance
b. Scanning
c. Gaining access
d. Maintaining access
Answer: Scanning

Leave a Comment