An example of _______________ authentication is presenting a smartcard to a proximity badge reader and then placing your finger on a fingerprint reader to access a secure area.

Fill in the blank(s) with the appropriate word(s).


biometric

correct

Computer Science & Information Technology

You might also like to view...

Public-key encryption is also known as ___________ .

A. digital-key encryption B. asymmetric encryption C. one-way time-exchange encryption D. optimal-key encryption

Computer Science & Information Technology

Write a sed program named div that copies a file to standard output, copies the first five lines to a file named first, and copies the rest of the file to a file named last.

What will be an ideal response?

Computer Science & Information Technology

Perception is best defined as___________.

a. the attempt to understand visual stimulus b. the attempt to understand color c. how we feel about things d. none of the above

Computer Science & Information Technology

To invoke the constructor of its superclass, a subclass can use the notation ____, and pass arguments to that constructor’s parameters within the parentheses.

A. parent() B. base() C. child() D. super()

Computer Science & Information Technology