I agree with Nenita. This is a straightforward question testing our understanding of the key terms. B and C are a bit too specific and not entirely accurate.
A and D seem to be the correct answers here. Exploits definitely take advantage of vulnerabilities, and malware can consist of both executable files and malicious code hidden in data files.
Bronwyn
6 days agoNenita
11 days agoJohnathon
13 days agoTish
25 days agoLezlie
27 days ago