Codes from exploit programs are frequently reused in:
A.
trojan horses only.
B.
computer viruses only.
C.
OS patchers.
D.
eavedroppers.
E.
trojan horses and computer viruses.
F.
None of the choices.
Explanation:
The term “”exploit”” generally refers to small programs designed to take advantage of a software flaw that has
been discovered, either remote or local.
The code from the exploit program is frequently reused in trojan horses and computer viruses. In some cases,
a vulnerability can lie in a certain programs processing of a specific file type, such as a non-executable media
file.