Which of the following provides a security professional with most information about the system-s security posture?
A. Wardriving, warchalking, social
engineering
B. Social engineering, company site browsing, tailgating
C. Phishing, spamming, sending trojans
D. Port scanning, banner grabbing, service identification