In the example plan in Reading #2, what was one the things reporters are forbidden Trom doing under this policy, based on a close and careful reading of the Guidance header? (Check all that apply)
◻Access real user data.
◻Report a denial of senice exploit.
◻Use scanning tools.
◻Submit reports detailing non-exploitable vulnerabilities.