__________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.

A. Trojan horse
B. Ransomware
C. Crimeware
D. Polymorphic

B. Ransomware

Computer Science & Information Technology

You might also like to view...

Atomicity refers to unmatched or missing data that is caused by limitations in database design

Indicate whether the statement is true or false

Computer Science & Information Technology

________ an outline level hides all subordinate heading and body text paragraphs

Fill in the blank(s) with correct word

Computer Science & Information Technology