Answer:
All of the above
Step-by-step explanation:
Flash drives may be stored with viruses, A file from an email might not be reputable, and Peer to Peer sights are risky and a virus can be disguised as a song. This proves that the answer is all of the above.