JAVA/Sun Exam Questions

Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse inste

Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse instead of an intended setuid program? (Assume only that the user’s shell initialization file is writable to the attacker.)

A.
changing the user’s PATH environment variable

B.
changing the user’s LD_ORIGIN environment variable

C.
changing the user’s LD_LIBRARY_PATH environment variable

D.
executing the pathconf(2) command to reset the user’s PATH

E.
creating a shell alias of the same name pointing to the Trojan horse