1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
3 years ago
8

Lena has secured her online website, which sells fashion apparel. She has taken all the necessary steps by making her website PS

I DSS compliant and providing a safe payment portal. What additional steps can she take to ensure cybersecurity?
A.
keeping the same set of customers
B.
training customer care executives to verify callers
C.
keeping a restriction on the maximum cart value
D.
keeping the server down as often as possible
Computers and Technology
1 answer:
Julli [10]3 years ago
5 0

Keeping a restriction on the maximum cart value is the additional steps that she can take to ensure cyber security.

c. keeping a restriction on the maximum cart value

<u>Explanation:</u>

For trading website should host their domain with proper cyber security enabled.  Lena has to restrict keeping on maximum car value or maximum quantity. Most of online website they enable maximum security with their service providers. Payment gateway places an important role for digital money transaction.

In India bhmi UPI interface in used whereas other side of India they used to do collaboration with private gateway and do the payment process successfully.

But Lena has to should not store the pin number or associated password of each purchase.

You might be interested in
The Constitution party advances a conservative approach to issues and would most likely support policies that __________.
vodka [1.7K]
The correct answer for this question is this one
reflect our basic principles." The Constitution party advances a conservative approach to issues and would most likely support policies that <span>reflect our basic principles and as well as respect whatever what we believe in.</span>
3 0
4 years ago
Short Essay on the history of Computer​
Ann [662]
Go on a essay website the right a essay about a topic !
5 0
3 years ago
Read 2 more answers
You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
valkas [14]
Client server network as it has a powerful server which provides all the networks required on the network. Files are usually backed up regularly.

3 0
4 years ago
What steps will change an existing macro? Use the drop-down menu to complete the steps.
Aneli [31]

Answer:

1. View

2. View macros

3. Edit

Explanation: completed on edge

6 0
3 years ago
Read 2 more answers
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is meant by Angular 4?
    15·2 answers
  • Can you recover deleted bookmarks on a Chromebook? If so, how?
    5·2 answers
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • Many PC operating systems provide functionality that enables them to support the simultaneous execution of multiple applications
    13·1 answer
  • Study the images of two different fronts.
    7·2 answers
  • What is the next line?
    7·1 answer
  • When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
    13·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!