Sam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system that runs on the Linux operating system. Sam wants to investigate and review local software, system LiBraries, and other applications installed on the system. Which of the following directories in Linux will he review to accomplish the task?
1) /usr/bin
2) /etc
3) /var/log
4) /home