lexirh6440 lexirh6440 18-10-2022 Computers and Technology contestada in the scanning phase, the attacker may attempt to use various methods in order to determine what operating system a user has and other system details. this is known as