Yeah, I'm a bit unsure about B and C as well. Though D does sound like it could be correct - malware often uses executable files rather than relying on exploits.
Hmm, this question seems to be focused on the precise definitions used in the Traps product and documentation. I think the key here is to really understand the nuanced usage of those terms, rather than relying on general knowledge.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Myra
8 months agoFrance
8 months agoVinnie
9 months agoMyra
9 months agoDeeann
9 months agoAdelaide
9 months agoCruz
10 months agoDeeann
10 months agoLindy
11 months agoRenay
11 months agoTatum
10 months agoRyann
10 months agoLewis
11 months agoJames
11 months ago