The figure is an animation that shows an attacker connected to a network. There are four reconnaissance attacks listed. When you click one type of attack, the animation demonstrates how the attack works with any results.