Haha, I bet the person who wrote this question doesn't even know what a real exploit looks like. Let's just hope it's not on the same level as their jokes.
A and D seem like the correct answers to me. Exploits do take advantage of vulnerabilities, and malware can be in the form of executable files rather than just data files.
Lai
6 months agoMignon
5 months agoGeoffrey
5 months agoRefugia
5 months agoMarylou
6 months agoAriel
5 months agoRebecka
5 months agoElbert
5 months agoGraciela
5 months agoAnnamaria
6 months agoFiliberto
5 months agoCarline
5 months agoMurray
6 months agoTerina
6 months agoFernanda
6 months agoNovella
6 months agoKina
6 months agoJacquelyne
7 months agoVeronique
7 months ago