Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is a physiological biometric that could be used for authentication?
Home
Cybersecurity Prologue
Which of the following is a physiological biometric that could be used for authentication?
0
votes
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
Which of the following is a physiological biometric that could be used for authentication?
Select the correct option from below
a) Gait
b) Signature
c) Voice Recognition
d) Facial Recognition
e) All the options
physiological-biometric
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Apr 2, 2022
by
sharadyadav1986
e) All the options
Gait, Signature, Voice Recognition and Facial Recognition are physiological biometric that could be used for authentication
Related questions
+1
vote
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
0
votes
Q: Your company is planning to use the Simple Storage Service to store objects that will be accessed by users. There is speculation that there would be roughly 6000 GET requests per second. Which of the following could be used to ensure optimal performance? (Select TWO)
asked
Apr 29
in
AWS
by
DavidAnderson
aws-certified-cloud-practitioner-exam
0
votes
Q: You are a developer that has recently been hired for your API expertise. The company is currently using API Gateway services for development. You need to control the behavior of an API's front-end interactions. Which of the following could be done to achieve this? (Select TWO.)
asked
Apr 17
by
DavidAnderson
aws-certified-cloud-practitioner-practice-exam
+2
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
0
votes
Q: An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
email-security
0
votes
Q: What are the various authentication mechanisms that can be used in Angular
asked
Feb 23
in
Angular
by
rahuljain1
angular-applications
0
votes
Q: We saw 4 types of messaging schemes that could be used in an IIoT system. 3 of these were: polling, interrupts and push status. A 4th scheme exists, with the MQTT protocol (and related to
asked
Jul 17, 2023
in
IOT Prime
by
Robin
mqtt
+2
votes
Q: Can you write a Java class that could be used both as an applet as well as an application?
asked
May 12, 2021
in
JAVA
by
rajeshsharma
java-class
java-application
java
Java-questions-answers
+1
vote
Q: What could be the problem when a command that was issued gave a different result from the last time it was used?
asked
May 10, 2021
in
Linux
by
rajeshsharma
#linux
problem
+1
vote
Q: Which of the following might be used to define how a future Problem or Incident could be managed?
asked
Feb 14, 2020
in
Agile
by
matthenary
...