Match each description with the appropriate term.       -       A.       B.   ...

60.1K

Verified Solution

Question

Accounting

Match each description with the appropriate term.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Automatically generated constantly by the system when userenters a PIN.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Logs that record activity at the system, application and uselevel.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Involves recording user’s keystrokes and the system’sresponse.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Summarizes key activities related to system resources.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Interception of user IDs, passwords, confidential e-mails, andfinancial data files.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Masquerading to gain access to a Web server and/or to perpetratean unlawful act without revealing one’s identity.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

An assault on a Web server to prevent it from servicingusers.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

DOS attacker that uses numerous intermediary computers to floodthe target computer with test messages, “pings” causing networkcongestion.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Prevent unauthorized access to or from a private network.

      -       A.      B.       C.      D.       E.      F.       G.      H.       I.      J.   

Electronic authentication where the Sender uses a one-wayhashing algorithm to calculate a digest of the text message whichis encrypted.

A.

Firewalls

B.

Digital Signature

C.

Keystroke Monitoring

D.

Denial of Service (DOS) Attack

E.

IP Spoofing

F.

Smurf

G.

One-time Passwords

H.

Event Monitoring

I.

System Audit Trails

J.

Sniffing

Answer & Explanation Solved by verified expert
3.5 Ratings (278 Votes)
Correct Match will be as follows Automatically generated constantly by the system when user enters a PIN G One time Passwords Logs that record activity at the system application and use level H Event    See Answer
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students