What type of reconnaissance involves the attacker attempting to gather information about the target without directly interacting with the systems or network infrastructure?
Active reconnaissance
Passive reconnaissance
Social engineering
Vulnerability scanning