A. cryptovirology B. infiltration C. malware D. ransomware
You can ask a new question or answer this question.