#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The infected file can be used by the self-execution facility tolaunch the malware code, or it can be executed by the user himself;

Answer

Exploitation