An auditor has identified an access control system that can incorrectly accept an access attempt from an unauthorized user. Which of the following authentication systems has the auditor reviewed?

A. Password-based
B. Biometric-based
C. Location-based
D. Certificate-based

Answer: B. Biometric-based

Computer Science & Information Technology

You might also like to view...

A knowledge of which of the following area-of-study combinations would give an HCT professional the best background?

a. anthropology and chemistry b. cognitive science and graphic design c. industrial design and biochemistry d. psychology and microbiology

Computer Science & Information Technology

Destructive partitioning is used to delete partitions, however all data associated with these partitions will remain intact

Indicate whether the statement is true or false

Computer Science & Information Technology