In which three situations would you create a compound attack object? (Choose three.)
A.
When the pattern “@@@@@@@@” and context “ftp-get-filename” completely define the
attack.
B.
When attack objects must occur in a particular order.
C.
When one of the attack objects is a protocol anomaly.
D.
When the pattern needs to be defined using a stream 256 context.
E.
You have at least two attack objects that define a single attack.