A and D for sure. Exploits leverage vulnerabilities, and malware can absolutely be in executable form. The other options just don't seem quite right to me.
I'm pretty sure B is wrong. Exploits can target all kinds of files, not just .exe. And C seems a bit off too - malware isn't just in data files, it can be in executables as well.
A and D seem to be the correct statements here. Exploits definitely take advantage of vulnerabilities, and malware can consist of both executable and non-executable files.
Gladys
2 months agoArthur
2 months agoClaudio
2 months agoClaudio
2 months agoHassie
2 months agoVincenza
3 months agoOctavio
2 months agoOctavio
2 months agoEvangelina
3 months agoWendell
3 months agoNana
3 months agoAimee
2 months agoDiane
2 months ago