An example of _______________ authentication is presenting a smartcard to a proximity badge reader and then placing your finger on a fingerprint reader to access a secure area.
Fill in the blank(s) with the appropriate word(s).
biometric
correct
You might also like to view...
Public-key encryption is also known as ___________ .
A. digital-key encryption B. asymmetric encryption C. one-way time-exchange encryption D. optimal-key encryption
Write a sed program named div that copies a file to standard output, copies the first five lines to a file named first, and copies the rest of the file to a file named last.
What will be an ideal response?
Perception is best defined as___________.
a. the attempt to understand visual stimulus b. the attempt to understand color c. how we feel about things d. none of the above
To invoke the constructor of its superclass, a subclass can use the notation ____, and pass arguments to that constructor’s parameters within the parentheses.
A. parent() B. base() C. child() D. super()