A and D seem to be the correct answers here. Exploits take advantage of vulnerabilities, and malware can be both executable files and application data files.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Candida
3 days ago