The FIRST step in a successful attack to a system would be:
Successful attacks start by gathering information about the target system. This is done in advance
so that the attacker gets to know the target systems and their vulnerabilities. All of the other choices
are based on the information gathered.