One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________
(a) strangers, keyloggers
(b) strangers, antivirus
(c) unknown, firewalls
(d) unknown, antivirus
This question was posed to me in an online quiz.
Question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security