____ exploration is a valuable strategy that can be used by both system administrators and potential intruders for gathering information about a system and its infrastructure vulnerabilities. a) Stealth b) Reconnaissance c) Penetration d) Surveillance