An auditor has identified an access control system that can incorrectly accept an access attempt from an unauthorized user. Which of the following authentication systems has the auditor reviewed?
A. Password-based
B. Biometric-based
C. Location-based
D. Certificate-based
Answer: B. Biometric-based
Computer Science & Information Technology
You might also like to view...
A knowledge of which of the following area-of-study combinations would give an HCT professional the best background?
a. anthropology and chemistry b. cognitive science and graphic design c. industrial design and biochemistry d. psychology and microbiology
Computer Science & Information Technology
Destructive partitioning is used to delete partitions, however all data associated with these partitions will remain intact
Indicate whether the statement is true or false
Computer Science & Information Technology