Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)