Question No. 1 When we consider the potential threat posed by a hacker, the first step in preparing to respond to this threat is to break the threat down into different categories. You anticipate that a hacker will attempt to intrude into the network with the objective of: 1. Copying some files 2. Defacing the Web page 3. Stealing credit card numbers How many “threat categories” does this threat represent? Question No. 2 1. list some ways in which a social engineering system hacker can attempt to gain information about a user’s login ID and password. 2. How would this type of attack differ when the target is an Administrative Assistant versus a Data Entry Clerk as the target?