A and D for sure. Exploits leverage vulnerabilities, and malware can absolutely be in executable form. The other options just don't seem quite right to me.
I'm pretty sure B is wrong. Exploits can target all kinds of files, not just .exe. And C seems a bit off too - malware isn't just in data files, it can be in executables as well.
A and D seem to be the correct statements here. Exploits definitely take advantage of vulnerabilities, and malware can consist of both executable and non-executable files.
Gladys
5 months agoArthur
5 months agoClaudio
4 months agoClaudio
5 months agoHassie
5 months agoVincenza
5 months agoOctavio
5 months agoOctavio
5 months agoEvangelina
5 months agoWendell
5 months agoNana
5 months agoAimee
5 months agoDiane
5 months ago