Security+ Pop Quiz: It’s perfectly normal in another reality<br />A security administrator is gathering information about a third-party from social media sites, corporate web sites, and annual reports. Which of the following would BEST describe these activities? A) Man-in-the-middle B) Exploiting a vulnerability C) White box disclosure D) Passive reconnaissance E) Log consolidation F) Not creepy at all