1. What is the difference between hashing and encryption?
2. Explain the cyber kill chain.
3. How do you perform a complete phishing analysis?
4. Linq questions: First vs Firstordefault, single vs singleordefault, convert generic list to non generic type.