network security needs

In the following link…Read it and answer the following questions:

1) What are the three most prevalent delivery vectors for weaponized payloads in an intrusion?

2) What is one suggested course of action to take in order to deny the delivery of a “payload” in an intrusion? Explain.

3) Give an example of each of the three types of indicators of an intrusion.

"Is this question part of your assignment? We can help"