Identify the potential benefits of biometrics.

What will be an ideal response?


It links the event to a particular individual: A password or token may be used by someone other than the authorized user
It is convenient: There is nothing to carry or remember
It is accurate: It provides for positive authentication
It provides an audit trail
It is becoming socially acceptable and cost effective

Computer Science & Information Technology

You might also like to view...

_________________ is how information is retrieved from a database.

a) Assessing b) Interceding c) Querying d) Altering e) Removing

Computer Science & Information Technology

Which of the following is NOT a recommended security setting for Apache Web servers?

A. harden the underlying OS B. create Web groups C. use the default standard Web page error messages D. disable HTTP traces

Computer Science & Information Technology

Which JavaScript keyword is needed to set aside random-access memory to store an object variable?

A) var B) new C) prototype D) this

Computer Science & Information Technology

This entry appeared in the log of a server. Message: Access denied with code 403 (phase 2). Pattern match "union.{1,100}?select" at ARGS:$id. [data "union all select"] [severity "CRITICAL"] [tag "WEB_ATTACK"] [tag"WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] Action: Intercepted (phase 2 ) Apache-Handler: php5-script What type of attack has been attempted?

A. integer overflow B. SQL injection C. buffer overflow D. port scan

Computer Science & Information Technology