Question: a. How do you authenticate yourself with an access card? b. What is biometrics? 21b.) Using bodily measurements for authentication is ______. a. Illegal b.

a. How do you authenticate yourself with an access card?

b. What is biometrics?


21b.) Using bodily measurements for authentication is ______.

a. Illegal

b. Biometrics

c. Mandatory for good security

d. All of the above


c. Why may fingerprint recognition be acceptable for user authentication to a laptop that does not contain sensitive information?

21c.) Fingerprint recognition is usually acceptable for  ______.

a. Laptops

b. Corporate databases

c. Resources involving private information about customers

d. All of the above


d. Why is iris recognition desirable?

21d.) Iris scanning is attractive because of its  ______.

a. Low cost

b. Precision

c. Both A and B

d. Neither A nor B


e. Why is face recognition controversial?

21e.) Facial recognition is controversial because  ______.

a. It can be fooled very easily

b. It can be used surreptitiously

c. Both A and B

d. Neither A nor B

Step by Step Solution

3.47 Rating (170 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a You swipe it b The use of biological measurements to authenticate you 21b ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!