Codes from exploit programs are frequently reused in:
trojan horses only.
computer viruses only.
trojan horses and computer viruses.
None of the choices.
“The term “”exploit”” generally refers to small programs designed to take advantage of a software
flaw that has been discovered, either remote or local. The code from the exploit program is
frequently reused in trojan horses and computer viruses. In some cases, a vulnerability can lie in a
certain programs processing of a specific file type, such as a non-executable media file.”