Read "Penetration Testing - Reconnaissance with NMAP Tool," by Kaur and Kaur, from International Journal of Advanced Research in Computer Science (2017).
Read "Penetration Testing - Reconnaissance with NMAP Tool," located within the required readings.
In the article, the authors discuss two tools for consideration as use for reconnaissance in cyberattacks.
Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.