An organization's network has been compromised with a piece of software that encrypts data and requests payment to provide the decryption key. Which type of malware has MOST likely infected the organization's system?
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance