a. How do you authenticate yourself with an access card? b. What is biometrics? 21b.) Using bodily
Question:
a. How do you authenticate yourself with an access card?
b. What is biometrics?
21b.) Using bodily measurements for authentication is ______.
a. Illegal
b. Biometrics
c. Mandatory for good security
d. All of the above
c. Why may fingerprint recognition be acceptable for user authentication to a laptop that does not contain sensitive information?
21c.) Fingerprint recognition is usually acceptable for ______.
a. Laptops
b. Corporate databases
c. Resources involving private information about customers
d. All of the above
d. Why is iris recognition desirable?
21d.) Iris scanning is attractive because of its ______.
a. Low cost
b. Precision
c. Both A and B
d. Neither A nor B
e. Why is face recognition controversial?
21e.) Facial recognition is controversial because ______.
a. It can be fooled very easily
b. It can be used surreptitiously
c. Both A and B
d. Neither A nor B
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko