A type of computer attack that in which the intruder engages with the targeted system is known as _______________
Select the appropriate answer from below options:
a) Passive Reconnaissance
b) Active Reconnaissance
c) White Box Assessment
d) Red Team Assessment