Yeah, I'm a bit unsure about B and C as well. Though D does sound like it could be correct - malware often uses executable files rather than relying on exploits.
Hmm, this question seems to be focused on the precise definitions used in the Traps product and documentation. I think the key here is to really understand the nuanced usage of those terms, rather than relying on general knowledge.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Myra
6 months agoFrance
6 months agoVinnie
6 months agoMyra
6 months agoDeeann
6 months agoAdelaide
6 months agoCruz
7 months agoDeeann
7 months agoLindy
8 months agoRenay
8 months agoTatum
8 months agoRyann
8 months agoLewis
8 months agoJames
8 months ago