An attack that uses phishing techniques along with specialized forms of malware to encrypt the victim's data files is known as __________.

A. crypto locking
B. ransomware
C. jailbreaking
D. spam


Answer: B

Computer Science & Information Technology

You might also like to view...

A declaration allows you to test certain aspects of a program at compile time.

a. compile_time_test b. static_assert c. test d. check

Computer Science & Information Technology

If your computer is ________ messages are stored in the Outbox.

a. offline b. wired c. online d. connected

Computer Science & Information Technology

You have been tasked with deploying a cloud based Microsoft Azure service that creates predictive analytics models. What Azure service should you use?

A. Machine Learning B. DevTest Labs C. App Service D. Log Analytics

Computer Science & Information Technology

To switch between activating the fill and activating the stroke, you should press which key?

A. 1 B. spacebar C. + D. X

Computer Science & Information Technology