___________is the potential for the function of a biometric system to be compromised by fraudulent activity, design flaw, accident, hardware failure, or external environmental condition.
A. data vaulting
B. accuracy
C. backups
D. vulnerability
E. compromise
Answer: D
You might also like to view...
which of the following is false?
a. The colon (:) in the header of the class definition indicates inheritance. b. The keyword public indicates the type of inheritance. c. All the public and protected members of class BasePlusCommissionEmployee are inherited as public and protected members, respectively, into class CommissionEmployee. d. CommissionEmployee is the base class and BasePlusCommissionEmployee is the derived class.
If you don't want to use BitLocker to protect your computer, you can still configure a power-on password using which of the following?
A. Windows POP technology B. the BIOS C. a feature available on some DVD drives D. your USB keyboard
In order to track changes, a workbook must be ________
Fill in the blank(s) with correct word
__________ provide authentication which can legally prove who sent a message over a network.
a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids