header bg

Question:

To converge more in-depth information on the targets, which stage of an ethical hack would the attacker actively apply tools and techniques?

A Scanning and enumeration
Explaination

Scanning and enumeration, the second of five phases of an ethical hack attempt, is the stage in which ethical hackers take the information collected in recon and actively employ tools and techniques to obtain additional in-depth information on the targets.