Yeah, I'm a bit unsure about B and C as well. Though D does sound like it could be correct - malware often uses executable files rather than relying on exploits.
Hmm, this question seems to be focused on the precise definitions used in the Traps product and documentation. I think the key here is to really understand the nuanced usage of those terms, rather than relying on general knowledge.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Myra
7 months agoFrance
7 months agoVinnie
7 months agoMyra
7 months agoDeeann
8 months agoAdelaide
8 months agoCruz
9 months agoDeeann
9 months agoLindy
9 months agoRenay
9 months agoTatum
9 months agoRyann
9 months agoLewis
9 months agoJames
9 months ago