IBPS RRB PO Mains 13 Oct 2019 Paper
Show Para
Question Numbers: 141-146
In the following passage, some words have been deleted. Fill in the blanks with the help of the alternatives given. Select the most appropriate option for each blank.
Financial institutions may have strong cyber defences, but they also ______ (1) upon third parties – often entrusted with highly confidential data related to procurement and transactions, but who may not __________ (2) the same levels of security and sophistication of the financial institutions they are serving.
Cyber criminals gravitate to the _________ (3) spots in institutions’ defences, and that often means going after customers. Bank accounts have typically become part of customers’ technology “footprint” with account information contained on home PCs and mobile devices. Criminals seek to compromise data security in a variety of ways, including installing _________ (4)– often using “phishing” emails – to compromise customers’ data security, and emulating unsecured Wi-Fi facilities in cafes, restaurants and airports; thieves have even been known to set up fake accounts to direct traffic where they ______(5) it to go.
One of the big problems for financial institutions is that there are multiple people and departments responsible for managing the various risks related to cyber security. In an age in which cyber criminals can do enormous damage, there is a strong case to be made for aligning and/or integrating various functions such as fraud __________ (6), IT security and compliance into a more cohesive group, possibly with a chief cyber risk officer overseeing all digital security measures.
In the following passage, some words have been deleted. Fill in the blanks with the help of the alternatives given. Select the most appropriate option for each blank.
Financial institutions may have strong cyber defences, but they also ______ (1) upon third parties – often entrusted with highly confidential data related to procurement and transactions, but who may not __________ (2) the same levels of security and sophistication of the financial institutions they are serving.
Cyber criminals gravitate to the _________ (3) spots in institutions’ defences, and that often means going after customers. Bank accounts have typically become part of customers’ technology “footprint” with account information contained on home PCs and mobile devices. Criminals seek to compromise data security in a variety of ways, including installing _________ (4)– often using “phishing” emails – to compromise customers’ data security, and emulating unsecured Wi-Fi facilities in cafes, restaurants and airports; thieves have even been known to set up fake accounts to direct traffic where they ______(5) it to go.
One of the big problems for financial institutions is that there are multiple people and departments responsible for managing the various risks related to cyber security. In an age in which cyber criminals can do enormous damage, there is a strong case to be made for aligning and/or integrating various functions such as fraud __________ (6), IT security and compliance into a more cohesive group, possibly with a chief cyber risk officer overseeing all digital security measures.
Go to Question:
More Free Exams:
- IBPS Clerk Mains Previous Papers
- IBPS Clerks Model Papers
- IBPS Clerks Previous Papers
- IBPS PO Mains Previous Papers
- IBPS PO Model Papers
- IBPS PO Previous Papers
- IBPS RRB PO Previous Papers
- IBPS SO Model Papers
- SBI Clerk Previous Papers
- SBI Junior Associate Model Papers
- SBI PO Model Papers
- SBI PO Previous Papers