Simulation Lab 12.1: Module 12 Configure Sign-in Options Using Cognitive Biometrics
When implementing biometric security, you want to allow the maximum number of legitimate users while blocking imposters. Which of the choices describes the aggregate rate of acceptance and rejection?
CER
While reviewing several certificate-based authentication methods, which choice can support event driven HOTP?
Cell phones
You need to identify a federated development technology to be used to support SSO. Choose the technology that would NOT be used from those provided.
PBKDF2
On examining the methods of standard biometric authentication available, which would NOT be considered?
Speech recognition
On inspecting the methods of standard biometric authentication identification available be which physical attribute would NOT be considered?
Weight