1 | 3 | |||||||||||||||||||||
4 | ||||||||||||||||||||||
2 | ||||||||||||||||||||||
1. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.
2. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
3. A software program designed to detect, prevent, and remove computer viruses and other malicious software.
4. A type of malicious software that can replicate itself and spread to other computers.