What is the unauthorized discovery and mapping of systems, services, or vulnerabilities?

What is the unauthorized discovery and mapping of systems, services, or vulnerabilities?



Answer: Reconnaissance


Learn More :