What are the three phases a hacker goes through prior to attacking their victim?
a. Footprinting, scanning, and enumeration
b. Footprinting, searching, and enumeration
c. Footprinting, scanning, and evaluation
d. Footprinting, scanning, and engineering