Match the asymmetric properties of cyber attacks to the scenario. Understandability A. The malware remained hidden in the system months before the attack Manifestation B. The vulnerability in the software was difficult to fix Dimensionality because it required so many steps to reproduce Non-linearity C. In November of 1988 , the first computer worm was able to infect 10% of the Internet within 24 hours Coupling D. Instead of intruding into the system, the adversary Velocity hijacked a DNS server and rerouted web traffic to their Detectability malicious site E. The adversary was able to shut off power to the city for a week from the safety of their own home F. The banking trojan removed all log traces of itself before remaining dormant G. It was difficult to prosecute the adversaries because the cyber attack originated from so many geographical locations.