What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

A. keylogger
B. rootkit
C. ransomware
D. macro


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1: The man command is issued to mange the computer resources. 2: Any user can change the system date and time using the date command. 3: Only the system administrator is authorized to change the system time. 4: Fields in the command line are separated by a space. 5: UNIX provides more than one shell and you can change your current shell to another available shell.

Computer Science & Information Technology

Which of the following virus types can change its signature every time it infects a new file?

a. Polymorphic virus b. RAM virus c. Multipartite virus d. Sparse infection virus

Computer Science & Information Technology

The hostname property of the Location object references the URL's host name without the port number.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A problem with pattern-matching is synonyms. If the current directory is bin and . denotes the current directory and .. its parent, then bin, ../bin, ../bin/., .././bin/../bin all denote the same directory. If you are trying to block access to the bin directory in a command script, you need to consider all these variants (and an infinite number more). Cite a means by which a pattern matching algorithm copes with synonyms.

What will be an ideal response?

Computer Science & Information Technology