____ exploration is a valuable strategy that can be used by both system administrators and potential intruders for gathering information about a system and its infrastructure vulnerabilities.
a) Stealth
b) Reconnaissance
c) Penetration
d) Surveillance