Which of the following virus types works as a worm, then either disables system services or encrypts user files and demands a monetary payment to release those files or services?
A) Boot sector viruses
B) Ransomware
C) Macro viruses
D) Stealth viruses
B) Ransomware
Computer Science & Information Technology
You might also like to view...
____ authentication is highly secure because physical characteristics such as fingerprints are unique to the individual and hard to duplicate.
A. Biometric B. Physical C. Logical D. Federated
Computer Science & Information Technology
Upon which architecture is the X Window system based?
A. Client/server B. Peer-to-peer(P2P) C. Star D. Fiber Optic
Computer Science & Information Technology
Which of the following is not a Structured Graphics control supported fill style?
a) spline b) vertical gradient c) diagonal lines d) circular gradient
Computer Science & Information Technology
The System ________ Index is a number between 1 and 10 and is determined by how many system errors have occurred up to that day
Fill in the blank(s) with correct word
Computer Science & Information Technology