Which of the following can be referred to as attack method(s)? Select all that apply Vulnerability scan SQL Injection Drive-by downloading Brute force