Codes from exploit programs are frequently reused in:

Codes from exploit programs are frequently reused in:

Codes from exploit programs are frequently reused in:

A.
trojan horses only.

B.
computer viruses only.

C.
OS patchers.

D.
eavedroppers.

E.
trojan horses and computer viruses.

F.
None of the choices.

Explanation:
The term “”exploit”” generally refers to small programs designed to take advantage of a software flaw that has
been discovered, either remote or local.
The code from the exploit program is frequently reused in trojan horses and computer viruses. In some cases,
a vulnerability can lie in a certain programs processing of a specific file type, such as a non-executable media
file.



Leave a Reply 0

Your email address will not be published. Required fields are marked *