A chief information security officer (CISO) is providing a presentation to a group of network engineers. In the presentation, the CISO presents information regarding exploit kits. Which of the following might the CISO present?
A. Exploit kits are tools capable of taking advantage of multiple CVEs
B. Exploit kits are vulnerability scanners used by penetration testers
C. Exploit kits are WIFI scanning tools that can find new honeypots
D. Exploit kits are a new type of malware that allow attackers to control their computers