Posted by: Pdfprep
Post Date: October 25, 2020
After several attempts, an attacker was able to gain unauthorized access through a biometric sensor using the attacker’s actual fingerprint without exploitation.
Which of the following is the MOST likely explanation of what happened?
A . The biometric device is tuned more toward false positives
B . The biometric device is configured more toward true negatives
C . The biometric device is set to fail closed
D . The biometnc device duplicated a valid user’s fingerpnnt.
Answer: A
Leave a Reply