You have been hired as a consultant to perform a network security assessment for a large firm – you will be
focusing on Fooitprinting and Scanning the organization.
- Describe the methodology and tools you would use to conduct your assessment.
- Give a rationale for each step in your methodology.
