Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
A. lock-ware
B. ransomware
C. stealware
D. hostageware
Answer: B
You might also like to view...
Types in Java are divided into two categories. The primitive types are boolean, byte, char, short, int, long, float and double. All other types are ________ types.
a. static b. reference c. declared d. source
You should use the ________ character in places of spaces in a filename
A) period (.) B) pound (#) C) percent (%) D) underscore (_)
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch with zero data loss in the event of a failure at the source site?
A. Virtual replication B. Asynchronous replication C. Synchronous replication D. Paired replication
Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________).
A. XOR B. EOR C. NOR D. OR