A and D for sure. Exploits leverage vulnerabilities, and malware can absolutely be in executable form. The other options just don't seem quite right to me.
I'm pretty sure B is wrong. Exploits can target all kinds of files, not just .exe. And C seems a bit off too - malware isn't just in data files, it can be in executables as well.
A and D seem to be the correct statements here. Exploits definitely take advantage of vulnerabilities, and malware can consist of both executable and non-executable files.
Gladys
1 months agoArthur
1 months agoClaudio
23 days agoClaudio
28 days agoHassie
1 months agoVincenza
1 months agoOctavio
1 months agoOctavio
1 months agoEvangelina
1 months agoWendell
2 months agoNana
2 months agoAimee
1 months agoDiane
1 months ago