What is an example of gaining access to an adversary? 1) Social engineering using piggybacking 2) Following the careless employee through a card controlled door 3) Zero-day attack acquiring or creating 4) Weaponization 5) Vulnerabilities 6) Delivery 7) Exploitation