You have a client-side exploit that takes advantage of a vulnerability in Adobe Acrobat products. You are performing a blind penetration test on an organization with unknown types and versions of software. Which of the following actions will best predict whether your exploit will succeed?
1) View the metadata of a recent PDF created by an employee of the organization
2) Run MBSA against Windows computers on the organization's network
3) Use the fingerprinting feature of nmap against a range of the organization's workstations