which of the following attacks?

The use of residual biometric information to gain unauthorized access is an example of which of the following
attacks?

The use of residual biometric information to gain unauthorized access is an example of which of the following
attacks?

A.
Replay

B.
Brute force

C.
Cryptographic

D.
Mimic

Explanation:
Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be reused by an
attacker to gain unauthorized access. A brute force attack involves feeding the biometric capture device
numerous different biometric samples. A cryptographic attack targets the algorithm or the encrypted data, in a
mimic attack, the attacker reproduces characteristics similar to those of the enrolled user, such as forging a
signature or imitating a voice.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three + fifteen =