Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
A. hacker
B. script kiddie
C. cyberextortionist
D. cyberterrorist
Answer: C
Computer Science & Information Technology
You might also like to view...
________ can be effectively used to distinguish between different tasks or objects on a navigation form
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
A. spoofing B. pop-up C. proxy D. phishing
Computer Science & Information Technology