As an alternative to just destroying data, some malware encrypts the user's data and demands payment in order to access the key needed to recover this information.This is sometimes known as _________
A) a trapdoor
B) a logic bomb
C) ransomware
D) spear-phishing
Correct Answer:
Verified
Q16: Usually, a downloader is sent in an
Q17: A zombie is a program activated on
Q18: Malicious software constitutes one of the most
Q19: Microsoft Word, Excel files, and Adobe PDF
Q20: A _ lies dormant until a predefined
Q22: There are _ generations of antivirus software
A)two
B)three
C)four
D)five
Q23: The _ is the event or condition
Q24: A _ virus is a virus that
Q25: A Worm typically uses the _
A)dormant phase
B)execution
Q26: The _ method uses information contained on
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents