An area to which access is controlled by retina scan is protected by which of the following security measure types?

A. Two-factor authentication
B. Biometric
C. Cipher locks
D. Optical reader
E. Proximity reader


Answer: B. Biometric

Computer Science & Information Technology

You might also like to view...

The first step in formally managing a project of any size is to define the project ____.

A. scope B. goal C. parameters D. hierarchy

Computer Science & Information Technology

The __________ line interface is a text-based environment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In order for derived classed to have access to encapsulated data members and methods of superclasses, the data members and methods should be declared using the ____________________ modifier.

a) private b) public c) protected d) final e) static

Computer Science & Information Technology

Which of the following can use a third party back-end LDAP user database for authentication?

A. ISAKMP B. TACACS+ C. PKI D. CHAP

Computer Science & Information Technology