work through the following scenario: suppose you are the victim of a malware attack and you suspect a spoofed website is the problem. summarize how each tool could help you in your investigation of the website. whois traceroute netstat