✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
An attacker downloads a PDF from a target's website and wants to exploit a vulnerability in the PDF. What tool can the attacker use to view information about the tool that was used to create the PDF?