Wow, this is a tricky one! I think the answer is A and D - the exploit can work if the right application is installed, and just previewing the attachment could launch it. Gotta be careful with those sketchy email attachments, am I right?
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dana
4 days ago