Which three are components of a security rule? (Choose three.)
Methods
Security String
Trigger
User or host profile
Action
Submit