the questions thoroughly. 1. Which kind of attack is usually sent by email or messaging systems? 2. Why is it so easy to spoof someone by email? 3. What would be an example of link manipulation? 4. What is the benefits of being a spammer? 5. What is social engineering and what are some example social engineering? 6. What is crypto mining malware? 7. What are some techniques CPU hijackers use? 8. If using Windows, what application can you use to check your CPU usage? 9. Find any current news of any websites known for crypto mining without the users knowing. Be sure to site the source in APA format. 10. Find any current news of social engineering used in today's landscape. Be sure to site the source in APA format. .