Problem: The attacker will have a good understanding about the security posture and very high-level network and server details. The next step that the attacker will perform is to scan and enumerate the systems. To help understand what scanning and enumeration are, provide your responses to the following:
1. Describe scanning and enumeration.
2. Discuss the pros and cons of 2 scanning and enumeration tools.
3. Explain how enumeration can be considered first contact.