Watch this video on YouTube
Which of the options below enables attackers to create a map or diagram of the target organization's network infrastructure, providing insights into the actual environment they intend to compromise?