in Education by
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________ (a) strangers, keyloggers (b) strangers, antivirus (c) unknown, firewalls (d) unknown, antivirus This question was posed to me in an online quiz. Question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (a) strangers, keyloggers The best explanation: One must isolate payment systems and payment processes from those computers that you think are used by strangers or may contain keyloggers. Otherwise, your card details and PIN may get compromised.

Related questions

0 votes
    Infected computers and other systems within the botnet are called __________ (a) killers (b) vampires (c) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information. ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    A _____________ is a number of Internet-connected systems, where each of them is running one or more bots. ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _____________ can modify data on your system - so that your system doesn't run correctly or you can no ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    How many basic processes or steps are there in ethical hacking? (a) 4 (b) 5 (c) 6 (d) 7 This question ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    A _____________ attack one of the simplest processes of gaining access to any password-protected system. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...