Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
To encrypt data for ransom
To gather sensitive information from a target
To launch a large-scale cyberattack
To trigger a malicious action based on specific conditions
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!