Random7733 Random7733 19-04-2024 Computers and Technology contestada In the network attacking step, the hackers normally prefer to hide their identity and their activities. Which step is this? 1) Reconnaissance 2) Spoofing 3) Weaponization 4) Exploitation