In which of the following malicious hacking steps does email tracking come under?
Reconnaissance
Gaining access
Maintaining Access
Scanning
Submit