Which type of Trojan restricts access to the computer system and demands a ransom for the restrictions to be removed?
a. Remote access
b. Data hiding
c. e-Banking
d. Proxy
ANS: B
Computer Science & Information Technology
You might also like to view...
What command is used to display the port assignments for the Software- Development VLAN? List both the prompt and the command.
What will be an ideal response?
Computer Science & Information Technology
Programs that control and coordinate computer hardware are called ________ software
Fill in the blank(s) with correct word
Computer Science & Information Technology
Clicking the Show Formulas button in the Formula Auditing group on the Formula tab displays the ________ in the appropriate cells
A) underlying formulas B) displayed values C) displayed formulas D) underlying values
Computer Science & Information Technology
The Print Server role service that enables UNIX clients to use the LPR utility to print documents to Windows-based printers on the network is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology