Which type of Trojan restricts access to the computer system and demands a ransom for the restrictions to be removed?

a. Remote access
b. Data hiding
c. e-Banking
d. Proxy


ANS: B

Computer Science & Information Technology

You might also like to view...

What command is used to display the port assignments for the Software- Development VLAN? List both the prompt and the command.

What will be an ideal response?

Computer Science & Information Technology

Programs that control and coordinate computer hardware are called ________ software

Fill in the blank(s) with correct word

Computer Science & Information Technology

Clicking the Show Formulas button in the Formula Auditing group on the Formula tab displays the ________ in the appropriate cells

A) underlying formulas B) displayed values C) displayed formulas D) underlying values

Computer Science & Information Technology

The Print Server role service that enables UNIX clients to use the LPR utility to print documents to Windows-based printers on the network is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology