What is an example of gaining access to an adversary?
 1) Social engineering using piggybacking
 2) Following the careless employee through a card controlled door
 3) Zero-day attack acquiring or creating
 4) Weaponization
 5) Vulnerabilities
 6) Delivery
 7) Exploitation