you have been asked to explain a few information security principles to a network infrastructure technician who has been in the industry for just a couple of years. after chatting a little while about threat actors, you decide to mention some of the attributes that differentiate attackers from one another, and which can help explain the types of attacks that can be expected from them. which of the following might you decide to include in the conversation?each correct answer represents a complete solution. choose three.