In: Accounting
Match each description with the appropriate term.
|
|
Correct Match will be as follows:
Automatically generated constantly by the system when user enters a PIN – G. One time Passwords
Logs that record activity at the system, application and use level – H. Event Monitoring
Involves recording user’s keystrokes and the system’s response – C. Keystroke Monitoring
Summarizes key activities related to system resources – I. System Audit Trails
Interception of user IDs, passwords, confidential e-mails, and financial data files- J. Sniffing
Masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity – E. IP Spoofing
An assault on a Web server to prevent it from servicing users- D. Denial of Service Attack
DOS attacker that uses numerous intermediary computers to flood the target computer with test messages, “pings” causing network congestion- F. Smurf
Prevent unauthorized access to or from a private network- A. Firewalls
Electronic authentication where the Sender uses a one-way hashing algorithm to calculate a digest of the text message which is encrypted - B. Digital Signature