Haha, I bet the person who wrote this question doesn't even know what a real exploit looks like. Let's just hope it's not on the same level as their jokes.
A and D seem like the correct answers to me. Exploits do take advantage of vulnerabilities, and malware can be in the form of executable files rather than just data files.
Lai
4 months agoMignon
3 months agoGeoffrey
4 months agoRefugia
4 months agoMarylou
4 months agoAriel
3 months agoRebecka
3 months agoElbert
4 months agoGraciela
4 months agoAnnamaria
5 months agoFiliberto
4 months agoCarline
4 months agoMurray
5 months agoTerina
5 months agoFernanda
4 months agoNovella
4 months agoKina
5 months agoJacquelyne
5 months agoVeronique
5 months ago