Which three are attack vectors protected by Web Security? (Choose three.)