Which of the following is the process of keeping track of a user’s activity while accessing network
resources?
A.
Authentication
B.
Auditing
C.
Spoofing
D.
Biometrics
Explanation:
Auditing is the process of keeping track of a user’s activity while accessing network resources.
Auditing is used to track user accounts for file and object access, logon attempts, system shutdown,
etc. This enhances the security of the network.Answer A is incorrect. Authentication is a process of verifying the identity of a person, network host,
or system process. The authentication process compares the provided credentials with the
credentials stored in the database of an authentication server.Answer C is incorrect. Spoofing is a technique that makes a transmission appear to have come from
an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker
modifies packet headers by using someone else’s IP address to hide his identity. However, spoofing
cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP
address causes the responses to be misdirected.Answer D is incorrect. Biometrics is a method of authentication that uses physical characteristics,
such as fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a
user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is
becoming more common in the business environment.