a contractor has been hired to conduct penetration testing on a company's network. they have decided to try to crack the passwords on a percentage of systems within the company. they plan to annotate the type of data that is on the systems that they can successfully crack to prove the ease of access to data. evaluate the penetration steps and determine which are being utilized for this task. (select all that apply.)