Codes from exploit programs are frequently reused in:

A.
trojan horses only.
B.
computer viruses only.
C.
OS patchers.
D.
eavedroppers.
E.
trojan horses and computer viruses.
F.
None of the choices.
Explanation:
“The term “”exploit”” generally refers to small programs designed to take advantage of a software
flaw that has been discovered, either remote or local.
The code from the exploit program is frequently reused in trojan horses and computer viruses. In
some cases, a vulnerability can lie in a certain programs processing of a specific file type, such as a
non-executable media file.”