ICMP Address Mask Ping Scan {Ans: nmap -sn -PM 1.2.3.4 An alternative to the traditional ICMP ECHO ping, where the attackers send an ICMP address mask query to the target host to acquire information related to the subnet mask. However, the address mask response from the destination host is conditional, and it may or may not respond with the appropriate subnet value depending on its configuration by the administratorThis type of ping method is also effective in identifying the active hosts similarly to the ICMP timestamp ping, specifically when the administrator blocks the traditional ICMP Echo ping.}Footprinting {Ans: Constitutes the preparatory phase, the first phase of hacking in which an attacker gathers as much information as possible about the target prior to the scanning phase in launching an attack.}Maintaining Access {Ans: The phase in which an attacker attempts to retain ownership of the system. Once an attacker gains access to the target system with admin-or root-level privileges (thus owning the system), they can use both the system and its resources at will.}Non-Repudiation {Ans: A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received