complet the following
1. On what condition would you use a command line tool (TCP Dump). Also, on what condition would you use GUI tool (Wireshark)
2. In a short paragraph, list and describe the four faces of and intrusion. That is, Reconnaissance, Attack, Entrenchment, and Abuse
3. In a short paragraph, describe the differences between direct and indirect form of reconnaissance and what they mean to an information Technology professional