Which of the following are necessary steps in the Ethical Hacking process? (Select all apply)Get PermissionPerforming ReconMaintaining AccessReportingPlanting Ransomware