heygirl5972 heygirl5972 26-01-2024 Computers and Technology contestada A Certified Ethical Hacker follows a specific methodology for testing a system. Which step comes after footprinting in the CEH methodology? a. Enumeration b. Scanning c. System hacking d. Social engineering