1-What are some techniques used in hiding tracks? Explain
2-List out the common directories for the Linux file structure
3-DarkComet is a Malware packager application used to weaponize an attack
4-Explain why understanding the OSI model is important to understand the attacker’s process.
5-What is Enumeration and why is it important as an ethical hacker?
6-What is NMAP and what is its primary objective?
7-What are some techniques used in hiding tracks?
8-What is OS Fingerprinting and why is it important?
9-List out 5 website footprinting tools and what is it used for? Why is it important?
10-What is Armitage & what can it be used for? Why is it a powerful tool?