a. Perform DDoS |
b. Steal bulk amount of sensitive data |
c. Spamming |
d. Encrypting for ransom |
Answer: Encrypting for ransom |
a. Perform DDoS |
b. Steal bulk amount of sensitive data |
c. Spamming |
d. Encrypting for ransom |
Answer: Encrypting for ransom |