An area to which access is controlled by retina scan is protected by which of the following security measure types?
A. Two-factor authentication
B. Biometric
C. Cipher locks
D. Optical reader
E. Proximity reader
Answer: B. Biometric
Computer Science & Information Technology
You might also like to view...
The first step in formally managing a project of any size is to define the project ____.
A. scope B. goal C. parameters D. hierarchy
Computer Science & Information Technology
The __________ line interface is a text-based environment.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In order for derived classed to have access to encapsulated data members and methods of superclasses, the data members and methods should be declared using the ____________________ modifier.
a) private b) public c) protected d) final e) static
Computer Science & Information Technology
Which of the following can use a third party back-end LDAP user database for authentication?
A. ISAKMP B. TACACS+ C. PKI D. CHAP
Computer Science & Information Technology