Yeah, I'm a bit unsure about B and C as well. Though D does sound like it could be correct - malware often uses executable files rather than relying on exploits.
Hmm, this question seems to be focused on the precise definitions used in the Traps product and documentation. I think the key here is to really understand the nuanced usage of those terms, rather than relying on general knowledge.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Myra
5 months agoFrance
5 months agoVinnie
5 months agoMyra
5 months agoDeeann
5 months agoAdelaide
5 months agoCruz
6 months agoDeeann
6 months agoLindy
7 months agoRenay
7 months agoTatum
6 months agoRyann
6 months agoLewis
7 months agoJames
7 months ago