Which three options are attack vectors of the threat-centric defense? (Choose three.)