The additional security option, used for credit card transactions, that keeps track of a customer’s historical shopping patterns and notes deviations from the norm is _____.

a. transaction incognito mode
b.transaction identification code
c.transaction-spam control software
d. transaction-risk scoring software

d. transaction-risk scoring software
Card verification value is a three-digit number above the signature panel on the back of a credit card. This technique makes it impossible to make purchases with a credit card number stolen online. An additional security option is transaction-risk scoring software, which keeps track of a customer’s historical shopping patterns and notes deviations from the norm.

Computer Science & Information Technology

You might also like to view...

To help Access determine what can be entered and stored in a field, select an appropriate ________ in Design view

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which file is created when you select Enable Boot Logging from the Advanced Boot Options menu and restart your system?

a. bootlog.txt b. event.log c. ntbtlog.txt d. BCD Store

Computer Science & Information Technology