Scenario: You have been hired as a consultant to perform a network security assessment for a large firm - you will be focusing on Footprinting and Scanning the organization. 1. Describe the methodology and tools you would use to conduct your assessment. 2. Give a rationale for each step in your methodology.