What is an example of gaining access to an adversary?
1) Social engineering using piggybacking
2) Following the careless employee through a card controlled door
3) Zero-day attack acquiring or creating
4) Weaponization
5) Vulnerabilities
6) Delivery
7) Exploitation