Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

A. hacker
B. script kiddie
C. cyberextortionist
D. cyberterrorist

Answer: C

Computer Science & Information Technology

You might also like to view...

________ can be effectively used to distinguish between different tasks or objects on a navigation form

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?

A. spoofing B. pop-up C. proxy D. phishing

Computer Science & Information Technology