Lena has secured her online website, which sells fashion apparel. She has taken all the necessary steps by making her website PS
I DSS compliant and providing a safe payment portal. What additional steps can she take to ensure cybersecurity? A.
keeping the same set of customers
B.
training customer care executives to verify callers
C.
keeping a restriction on the maximum cart value
D.
keeping the server down as often as possible
Keeping a restriction on the maximum cart value is the additional steps that she can take to ensure cyber security.
c. keeping a restriction on the maximum cart value
<u>Explanation:</u>
For trading website should host their domain with proper cyber security enabled. Lena has to restrict keeping on maximum car value or maximum quantity. Most of online website they enable maximum security with their service providers. Payment gateway places an important role for digital money transaction.
In India bhmi UPI interface in used whereas other side of India they used to do collaboration with private gateway and do the payment process successfully.
But Lena has to should not store the pin number or associated password of each purchase.
Slow computer, blue screen, Programs opening and closing automatically, Lack of storage space, Suspicious modem and hard drive activity, Pop-ups, websites, toolbars and other unwanted programs, or spam.
When analysed, logs can help to forestall security breaches to a network it can also help to identify and resolve any vulnerabilities within the system.
Due to the number of logs generated daily, it is almost impracticable to constantly monitor all logs generated by the system.
Because the LAN has a DHCP server configured in it.
Explanation:
DHCP stands for Dynamic Host Configuration Protocol and its a client/server protocol that assigns an IP address and other configuration parameters to automatically connect a computer to the network and start browsing the internet
Representatives of the following team must answer, examine, as well as report that evidence in even the most timely way possible throughout the examination through the circumstance
. They should not be conducting the counter attack to defend CBFs. They defend this in a different way.
So that is the reason by which the following statement is false.