Which of the following is true about improper error handling?
i) Attackers can use exposed error messages to craft advanced attacks and gain system access.
ii) Attackers can use error messages to extract specific information from a system.
iii) All the above options
iv) Attackers can use unexpected errors to knock an application offline, creating a denial-of-service attack.