What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?
A. keylogger
B. rootkit
C. ransomware
D. macro
Answer: C
You might also like to view...
Answer the following statements true (T) or false (F)
1: The man command is issued to mange the computer resources. 2: Any user can change the system date and time using the date command. 3: Only the system administrator is authorized to change the system time. 4: Fields in the command line are separated by a space. 5: UNIX provides more than one shell and you can change your current shell to another available shell.
Which of the following virus types can change its signature every time it infects a new file?
a. Polymorphic virus b. RAM virus c. Multipartite virus d. Sparse infection virus
The hostname property of the Location object references the URL's host name without the port number.
Answer the following statement true (T) or false (F)
A problem with pattern-matching is synonyms. If the current directory is bin and . denotes the current directory and .. its parent, then bin, ../bin, ../bin/., .././bin/../bin all denote the same directory. If you are trying to block access to the bin directory in a command script, you need to consider all these variants (and an infinite number more). Cite a means by which a pattern matching algorithm copes with synonyms.
What will be an ideal response?