ArianaXoxox3919 ArianaXoxox3919 08-12-2022 Computers and Technology contestada which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?