Course |
Information System Security |
0 out of 1 points
In Biometric Authentication, overly exact match will cause more secure authentication. |
||||
|
1 out of 1 points
System performs a N:N comparison against a biometric DB in attempt to establish the identity of an unknown individual. |
||||
|
1 out of 1 points
Which option is not related to voice recognamtion? |
||||
|
1 out of 1 points
In biometric functionality, Which step is before Application Device step? |
||||
|
0 out of 1 points
____________ means; probability that the system fails to detect a match between the input pattern and a matching template in the database. |
||||
|
1 out of 1 points
In 7 factors for biometric authentication, which one explain: |
||||
|
1 out of 1 points
In 7 factors for biometric authentication, which one explain: |
||||
|
1 out of 1 points
What is the most common type of biometrics device in the enterprise? |
||||
|
1 out of 1 points
Correspondingly, a higher threshold will reduce the ______ but increase the _______. |
||||
|
1 out of 1 points
Which option is not a security violation for false acceptance? |
||||
|
1 out of 1 points
Biometric authentication base on something you _____ |
||||
|
1 out of 1 points
A biometric modality that uses the cadence of an individual's typing pattern for recognition. |
||||
|
0 out of 1 points
Which option is not biometric method thet you are? |
||||
|
1 out of 1 points
It measures the percent of invalid inputs which are incorrectly accepted. |
||||
|
0 out of 1 points
For checking message integrity, destination checks provided hash code from source with public key of source. |
||||
|
0 out of 1 points
In certificate verification, Consumer must have a trusted copy of the subject’s public key. The consumer can then chain from his trusted copy of subject’s public key to a trusted copy of issuer’s public key. |
||||
|
0 out of 1 points
Two messages can have same hash value. |
||||
|
1 out of 1 points
In Digital Certificate, the plaintext contains of: |
||||
|
1 out of 1 points
If the threshold is reduced, there will be fewer false false accepts but more non-matches. |
||||
|
1 out of 1 points
In hash code, a small change in the input (message) drastically changes the output (digest). |
||||
|
1 out of 1 points
The matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. |
||||
|
1 out of 1 points
The system will succeed in identifying the individual if the comparison of the sample to a template in the DB falls within a previously set ___________. |
||||
|
1 out of 1 points
_________ means; when subject is trying to fool the system. |
||||
|
1 out of 1 points
The other term for False Accept Rate is _____________. |
||||
|
1 out of 1 points
For creating a digital signature, the process as follow: |
|||||
Follow Us