Haha, I bet the exam writers are trying to trip us up with these specific definitions. Gotta love how they like to get technical with the terminology. Anyways, I agree with the other candidates - A) and D) are the way to go here.
I'm not sure about B) - I don't think the primary vector for exploits is just .exe files. Exploits can target vulnerabilities in all kinds of software, not just executables. And C) seems too narrow - malware can be more than just application data files.
I agree with Melina. A) is definitely true - exploits aim to take advantage of vulnerabilities in code. And D) is also correct - malware consists of malicious executable files, not just application data files.
This question is pretty straightforward, but it's important to understand the specific definitions used in the Traps product and documentation. I think A) and D) are the correct answers.
Mirta
8 months agoRenea
8 months agoMelvin
8 months agoMelina
8 months agoClaudio
8 months agoSuzan
8 months agoDana
8 months ago