1. Describe the role that application security policies play in ensuring that applications are not hacked.2. Describe, compare and contrast ping, nmap, and nessus. Be sure to include how each type of tool fits into a layered security effort.