Topic 1: Installing a Malicious ExecutableIn the lab, you will see that a malicious actor managed to install a malicious executable on the system. Using your knowledge from prior classes, Internet research, and the course references, discuss one possible technique a malicious actor could have used to install the executable other than the one shown in the lab.Note: I will provide what technique was used in the lab as soon as I do this mentioned lab.Here is my E-book: Sheward, M. (2018). Hands-on incident response and digital forensics. BCS.Here is some extra references:Hands-on Incident Response and Digital Forensics, by Mike Sheward, in the Library. You can access the text through the Library portal.Chapter 3: “The Incident Response Process”In NIST Special Publication 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, read the following:Chapter 4, Section 2: “Detection and Analysis”National Institutes of Standards and Technology (NIST). https://www.nist.gov/Thank you in advance.