Which of the following is the process of keeping track of a user’s activity while accessing network
resources?
A.
Authentication
B.
Auditing
C.
Spoofing
D.
Biometrics
Explanation:
Auditing is the process of keeping track of a user’s activity while accessing network resources.
Auditing is used to track user accounts for file and object access, logon attempts, system shutdown,
etc. This enhances the security of the network.
or system process. The authentication process compares the provided credentials with the
credentials stored in the database of an authentication server.
an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker
modifies packet headers by using someone else’s IP address to hide his identity. However, spoofing
cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP
address causes the responses to be misdirected.
such as fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a
user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is
becoming more common in the business environment.
b