Gimmes often work through:

A.
SMS
B.
IRC chat
C.
email attachment
D.
news
E.
file download
F.
None of the choices.
Explanation:
Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse,
gimmes can arrive as an email attachment promising anything. The recipient is expected to give into the need to the
program and open the attachment. In addition, many users will blindly click on any attachments
they receive that seem even mildly legitimate.