FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Your company uses a fingerprint-based system for users to log in to their workstations. When you arrived at work this morning, you placed your finger on the biometric reader but the system identified you as an unauthorized user even though you know your account is valid. How should this be categorized?
A
False Acceptance
B
False Rejection
C
False Positive
D
False Negative
Explanation: 

Detailed explanation-1: -Biometrics. While some authentication systems depend solely on biometric identification, biometrics are usually used as a second or third authentication factor. The more common types of biometric authentication available include fingerprint scans, facial or retina scans, and voice recognition.

Detailed explanation-2: -Biometrics Examples While there are many types of biometrics for authentication, the five most common types of biometric identifiers are: fingerprints, facial, voice, iris, and palm or finger vein patterns.

Detailed explanation-3: -Biometric authentication devices rely on physical characteristics such as a fingerprint, facial patterns, or iris or retinal patterns to verify user identity. Biometric authentication is becoming popular for many purposes, including network logon.

Detailed explanation-4: -Vein Recognition This system is often used in high-security facilities, as vein patterns are difficult to fake. Vein scanning is considered one of the most secure and consistently accurate options for biometric authentication, especially when compared to fingerprint and facial recognition.

There is 1 question to complete.