Which of the following virus types works as a worm, then either disables system services or encrypts user files and demands a monetary payment to release those files or services?

A) Boot sector viruses
B) Ransomware
C) Macro viruses
D) Stealth viruses


B) Ransomware

Computer Science & Information Technology

You might also like to view...

____ authentication is highly secure because physical characteristics such as fingerprints are unique to the individual and hard to duplicate.

A. Biometric B. Physical C. Logical D. Federated

Computer Science & Information Technology

Upon which architecture is the X Window system based?

A. Client/server B. Peer-to-peer(P2P) C. Star D. Fiber Optic

Computer Science & Information Technology

Which of the following is not a Structured Graphics control supported fill style?

a) spline b) vertical gradient c) diagonal lines d) circular gradient

Computer Science & Information Technology

The System ________ Index is a number between 1 and 10 and is determined by how many system errors have occurred up to that day

Fill in the blank(s) with correct word

Computer Science & Information Technology