A and D for sure. Exploits leverage vulnerabilities, and malware can absolutely be in executable form. The other options just don't seem quite right to me.
I'm pretty sure B is wrong. Exploits can target all kinds of files, not just .exe. And C seems a bit off too - malware isn't just in data files, it can be in executables as well.
A and D seem to be the correct statements here. Exploits definitely take advantage of vulnerabilities, and malware can consist of both executable and non-executable files.
Gladys
4 months agoArthur
4 months agoClaudio
3 months agoClaudio
4 months agoHassie
4 months agoVincenza
4 months agoOctavio
4 months agoOctavio
4 months agoEvangelina
4 months agoWendell
4 months agoNana
4 months agoAimee
4 months agoDiane
4 months ago