An auditor has identified an access control system that can incorrectly accept an access attempt from an unauthorized user. Which of the following authentication systems has the auditor reviewed?

A. Password-based
B. Biometric-based
C. Location-based
D. Certificate-based


Answer: B. Biometric-based

Computer Science & Information Technology

You might also like to view...

Suppose an array reptiles is ["crocodile", "snake", "turtle", "lizard"]. To remove the first item from the array, use the statement ___.

A. reptiles.push("crocodile"); B. reptiles.push(); C. reptiles.pop("crocodile"); D. reptiles.pop(); E. reptiles.unshift("crocodile"); F. reptiles.unshift(); G. reptiles.shift("crocodile"); H. reptiles.shift();

Computer Science & Information Technology

List three main ways in which presentations of output are unintentionally biased.

What will be an ideal response?

Computer Science & Information Technology

Which of the following can be a member of a universal group? (Choose all that apply.)

a: User accounts from the local domain only b: Global groups from any domain in the forest c: Other universal groups d: Domain local groups from the local domain only

Computer Science & Information Technology

Using the SCR functions and organization listed in the data library; create an organization chart using Microsoft Word, Visio, or a drawing program. Be sure to show your own position on the chart.

What will be an ideal response?

Computer Science & Information Technology