As an alternative to just destroying data, some malware encrypts the user's data and demands payment in order to access the key needed to recover this information. This is sometimes known as _________

A. a trapdoor B. a logic bomb

C. ransomware D. spear-phishing

C

Business

You might also like to view...

The primary difference between an argot and a foreign language is the relationship between the implied and the unimplied meanings

Indicate whether the statement is true or false.

Business

It has been found that providing employees with personal days has been ineffective as a way of handling absenteeism

Indicate whether the statement is true or false.

Business