1. to explain how they would determine how much space they would have for their payload in an exploit? 2. to explain their approach to determining whether an application is vulnerable or not?