Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Which of the following is a physiological biometric that could be used for authentication?
Home
Cybersecurity Prologue
Which of the following is a physiological biometric that could be used for authentication?
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
Q:
Which of the following is a physiological biometric that could be used for authentication?
Select the correct option from below
a) Gait
b) Signature
c) Voice Recognition
d) Facial Recognition
e) All the options
physiological-biometric
1
Answer
0
votes
answered
Apr 2, 2022
by
sharadyadav1986
e) All the options
Gait, Signature, Voice Recognition and Facial Recognition are physiological biometric that could be used for authentication
Related questions
+1
vote
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
Q: Which of the following might be used to define how a future Problem or Incident could be managed?
asked
Feb 14, 2020
in
Agile
by
matthenary
+2
votes
Q: Can you write a Java class that could be used both as an applet as well as an application?
asked
May 12, 2021
in
JAVA
by
rajeshsharma
java-class
java-application
java
Java-questions-answers
+1
vote
Q: What could be the problem when a command that was issued gave a different result from the last time it was used?
asked
May 10, 2021
in
Linux
by
rajeshsharma
#linux
problem
+1
vote
Q: Which system table could be used to find an object id for any table/view or object in a database?
asked
Feb 20
in
Netezza
by
rajeshsharma
netezza
0
votes
Q: An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
email-security
+1
vote
Q: Which of the following options could be used in the tuple object?
asked
Jul 11, 2021
in
Python
by
rajeshsharma
tuple
python3
Python-questions-answers
+1
vote
Q: Does this mean i can construct an API on facet using node that could be a prototype (with, for instance, difficult-coded facts) and later enforce it on my returned quit?
asked
Jan 22, 2022
in
APIGEE - API Services
by
Robindeniel
api-construct
0
votes
Q: The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
weaken-security
0
votes
Q: Docker CLI can be used with ECR after authentication, and this authentication is valid for ________ hrs.
asked
Feb 20, 2022
in
Amazon ECS and Storage Gateway
by
rajeshsharma
docker-cli
ecr
0
votes
Q: An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
radius-extension
0
votes
Q: Which of the following services is a data storage system that also has REST API interface and uses secure HMAC-SHA1 authentication keys?
asked
Dec 5, 2020
in
Amazon Elastic Compute Cloud EC2
by
SakshiSharma
#rest-api
#hmac-sha1
0
votes
Q: Which value of Socket.readyState atribute of WebSocket indicates that the connection has been closed or could not be opened?
asked
Dec 2, 2020
in
HTML
by
Sandeepthukran
html5
html
0
votes
Q: Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
asked
Mar 5
in
Computational Fluid Dynamics
by
rajeshsharma
encryption
protocols
0
votes
Q: Which of the following modifiers can be used for a variable so that it can be accessed by any thread or a part of a program?
asked
Apr 10, 2021
in
JAVA
by
Robindeniel
java
java-questions-and-answers
java-mcq
core-java-mcq
java-multiple-choice-questions
java-questions-2021
java-interview-questions
java-advanced-questions
Java-questions-answers
0
votes
Q: Which of the following is a system for creating block-level storage devices that can be used for Amazon Machine Instances in EC2?
asked
Apr 2, 2021
in
AWS
by
sharadyadav1986
aws
mcq
questions
virtual
server
amazon
web
service
applications
storage
ec2
cloud
compute
archietecture
+2
votes
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
Q: Which of the following are benefits that implementing Service Transition could provide to the business?
asked
Feb 14, 2020
in
Agile
by
matthenary
0
votes
Q: Which parameter could be used to convert stacked barplot into grouped bar plot?
asked
Dec 30, 2019
in
R Language
by
sharadyadav1986
#stacked-barplot
...