For an extra level of security, some smart cards today store ____ data in the card and use that data to authenticate the card's user before authorizing the smart card transaction.

A. biometric
B. randomized
C. telescopic
D. familial


Answer: A

Computer Science & Information Technology

You might also like to view...

Printing can be done with only four colors.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why is important to remove objects that are no longer need in your program?

a. To prevent over writing new objects with old data b. To prevent program crashes c. To free up memory for other uses d. So the same variable can be assigned to a different object

Computer Science & Information Technology

To increase user security, Apple has introduced a ____ which is used to manage a user's list of all user names and passwords.

A. secure key ring B. secure key chain C. secure password chain D. secure password purse

Computer Science & Information Technology

The internal vulnerability assessment is usually performed against every device that is exposed to the Internet, using every possible penetration testing approach. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology