As an alternative to just destroying data, some malware encrypts the user's data and demands payment in order to access the key needed to recover this information. This is sometimes known as _________
A. a trapdoor B. a logic bomb
C. ransomware D. spear-phishing
C
Business
You might also like to view...
The primary difference between an argot and a foreign language is the relationship between the implied and the unimplied meanings
Indicate whether the statement is true or false.
Business
It has been found that providing employees with personal days has been ineffective as a way of handling absenteeism
Indicate whether the statement is true or false.
Business