Que: Which of the following is not a spot from where attackers seek information? a. Domain name b. IP address c. System enumeration d. Document files Answer: Document files