1) Explain the following with example and code: a) SQL Injectionb) Cross-site Scripting 2) Explain symmetric key encryption. How do you guarantee confidentiality?3) Explain in detail how you recognize the devices during active reconnaissance and how to counter them.4) Explain in detail password cracking and privilege escalation.