You are in the discovery/reconnaissance phase of a penetration test. You decided to use automated scanning software to gather recon data on the network under test before you attempt to penetrate. Which of the following could you use to preform this task?
|Operations and Incident Response|
|Architecture and Design|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|