Que: Which of the following comes after scanning phase in ethical hacking? a. Scanning b. Maintaining access c. Reconnaissance d. Gaining access Answer: Gaining access