__________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.
A. Trojan horse
B. Ransomware
C. Crimeware
D. Polymorphic
B. Ransomware
Computer Science & Information Technology
You might also like to view...
Atomicity refers to unmatched or missing data that is caused by limitations in database design
Indicate whether the statement is true or false
Computer Science & Information Technology
________ an outline level hides all subordinate heading and body text paragraphs
Fill in the blank(s) with correct word
Computer Science & Information Technology