Question
What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. cryptovirology
B. infiltration
C. malware
D. ransomware
A. cryptovirology
B. infiltration
C. malware
D. ransomware
Answers
GPT 3.5
D. ransomware