This is an easy one. A and D are the way to go. The exploit is designed to take advantage of a specific application, and it can be automatically triggered - no need to actually run the attachment.
Haha, C is a classic! Buffer overflow, really? I'd go with A and D, since the exploit relies on the user's system and can be activated without even running the file.
I'm not sure about C, but I agree that A and D are the right choices. The exploit needs a vulnerable application to work, and it can be triggered by simply opening the email.
I think the correct answers are A and D. The exploit can only work if the corresponding application is installed, and it can be launched just by previewing the attachment.
I think the likely effect of opening that email attachment is that the exploit can work only if a corresponding application is installed on the user's system.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yuette
2 months agoAn
1 months agoVincent
1 months agoMi
2 months agoDominque
2 months agoMary
2 months agoRicki
2 months agoPhyliss
2 months agoLeslie
2 months agoVeronika
1 months agoPatti
1 months agoYuki
1 months agoLorean
2 months agoTamar
3 months ago