In the network attacking step, the hackers normally prefer to hide their identity and their activities. Which step is this?
1) Reconnaissance
2) Spoofing
3) Weaponization
4) Exploitation