Yeah, I'm a bit unsure about B and C as well. Though D does sound like it could be correct - malware often uses executable files rather than relying on exploits.
Hmm, this question seems to be focused on the precise definitions used in the Traps product and documentation. I think the key here is to really understand the nuanced usage of those terms, rather than relying on general knowledge.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Cruz
1 days agoDeeann
2 days agoLindy
24 days agoRenay
25 days agoTatum
11 days agoRyann
12 days agoLewis
26 days agoJames
27 days ago