The FIRST step in a successful attack to a system would be: A、gathering information. B、gaining access. C、denying services. D、evading detection.