Course Hero Logo

If that single factor is a biometric when a single

  • No School
  • AA 1
  • MinisterTurtle9356
  • 91
  • 80% (5) 4 out of 5 people found this document helpful

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 58 - 60 out of 91 pages.

if that single factor is a biometric.When a single authentication factor is compared to other single authentication factors, they areWhen a single authentication factor is compared to other single authentication factors, they areall roughly the same in terms of strength of security protection. Thus, the single factors of aall roughly the same in terms of strength of security protection. Thus, the single factors of apassword, a non-PIN token device, and a USB drive with PKI certificates are all equally weak.password, a non-PIN token device, and a USB drive with PKI certificates are all equally weak.ReferencesReferencesLabSim for Security Pro, Section 8.2.LabSim for Security Pro, Section 8.2.[All Questions SecPro2017_v6.exm AUTH_09][All Questions SecPro2017_v6.exm AUTH_09]
Digital signatureDigital signatureIdentification codesIdentification codesBiometric template originalBiometric template originalExplanationExplanationA smart card cannot store biometric template originals, as those are physical components of theA smart card cannot store biometric template originals, as those are physical components of thehuman body.human body.A smart card can store digital signatures, cryptography keys, and identification codes.A smart card can store digital signatures, cryptography keys, and identification codes.ReferencesReferencesLabSim for Security Pro, Section 8.2.LabSim for Security Pro, Section 8.2.[All Questions SecPro2017_v6.exm AUTH_11][All Questions SecPro2017_v6.exm AUTH_11]Question 114:Question 114:IncorrectIncorrectWhich of the following terms is used to describe an event in which a person is denied access to aWhich of the following terms is used to describe an event in which a person is denied access to asystem when they should be allowed to enter?system when they should be allowed to enter?Error rateError rateFalse positiveFalse positiveFalse negativeFalse negativeFalse acceptanceFalse acceptanceExplanationExplanationAAfalse negativefalse negative(or Type I error) occurs when a person who should be allowed access is denied(or Type I error) occurs when a person who should be allowed access is deniedaccess.access.AAfalse positivefalse positive(or Type II error) occurs when a person who should be denied access is allowed(or Type II error) occurs when a person who should be denied access is allowedaccess. Theaccess. Theprocessing rateprocessing rate, or, orsystem throughputsystem throughput, identifies the number of subjects or, identifies the number of subjects orauthentication attempts that can be validated. Theauthentication attempts that can be validated. Thecrossover error ratecrossover error rate, also called the, also called theequalequalerror rateerror rate, is the point where the number of false positives matches the number of false, is the point where the number of false positives matches the number of falsenegatives in a biometric system.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 91 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture