Which of the following penetration testing concepts is being used when an attacker uses public Internet databases to enumerate and learn more
about a target?
A. Reconnaissance
B. Initial exploitation
C. Pivoting
D. Vulnerability scanning
E. White box testing