In which of the following malicious hacking steps does email tracking come under?
Maintaining Access
Gaining access
Reconnaissance
Scanning
Submit