Typically, by which two methods are APTs often achieved? (Choose two.)
A. using multiple attack vectors
B. maintaining a short presence in the network to avoid detection
C. following the same exact kill-chain sequence
D. exploiting "zero-day" vulnerabilities