slimshaddy4608 slimshaddy4608 29-03-2024 Computers and Technology contestada Which of the following is the third step in the ethical hacking methodology?a. Reconnaissanceb. Scanningc. Gaining accessd. Maintaining access