In which of the following attacks does the attacker gather information to perform an access attack?
Land attack
Reconnaissance attack
Vulnerability attack
DoS attack
Submit