___________is the potential for the function of a biometric system to be compromised by fraudulent activity, design flaw, accident, hardware failure, or external environmental condition.

A. data vaulting
B. accuracy
C. backups
D. vulnerability
E. compromise


Answer: D

Computer Science & Information Technology

You might also like to view...

which of the following is false?

a. The colon (:) in the header of the class definition indicates inheritance. b. The keyword public indicates the type of inheritance. c. All the public and protected members of class BasePlusCommissionEmployee are inherited as public and protected members, respectively, into class CommissionEmployee. d. CommissionEmployee is the base class and BasePlusCommissionEmployee is the derived class.

Computer Science & Information Technology

If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?

A. Windows POP technology B. the BIOS C. a feature available on some DVD drives D. your USB keyboard

Computer Science & Information Technology

In order to track changes, a workbook must be ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

__________ provide authentication which can legally prove who sent a message over a network.

a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

Computer Science & Information Technology