Haha, I bet the person who wrote this question doesn't even know what a real exploit looks like. Let's just hope it's not on the same level as their jokes.
A and D seem like the correct answers to me. Exploits do take advantage of vulnerabilities, and malware can be in the form of executable files rather than just data files.
Lai
2 months agoMignon
1 months agoGeoffrey
1 months agoRefugia
2 months agoMarylou
2 months agoAriel
1 months agoRebecka
1 months agoElbert
1 months agoGraciela
2 months agoAnnamaria
3 months agoFiliberto
2 months agoCarline
2 months agoMurray
3 months agoTerina
3 months agoFernanda
2 months agoNovella
2 months agoKina
3 months agoJacquelyne
3 months agoVeronique
3 months ago