PrepAway - Latest Free Exam Questions & Answers

Which of the following comparisons are used for identification and authentication in a biometric system?

Which of the following comparisons are used for identification and authentication in a biometric system?

A. One-to-many for identification and authentication

B. One-to-one for identification and authentication

C. One-to-many for identification and one-to-one for authentication

D. One-to-one for identification and one-to-many for authentication

In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for positive recognition (so that the user does not have to provide any information about the template to be used) or for negative recognition of the person -where the system establishes whether the person is who she (implicitly or explicitly) denies to be-

In verification (or authentication) mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be.

Management of Biometrics

Management of biometrics should address effective security for the collection, distribution and processing of biometrics data encompassing:

Data integrity, authenticity and non-repudiation

Management of biometric data across its life cycle – compromised of the enrollment, transmission and storage, verification, identification, and termination process

Usage of biometric technology, including one-to-one and one-to-many matching, for identification and authentication

Application of biometric technology for internal and external, as well as logical and physical access control

Encapsulation of biometric data

Security of the physical hardware used throughout the biometric data life cycle

Techniques for integrity and privacy protection of biometric data.

The following were incorrect answers:

All other choices presented were incorrectly describing identification and authentication mapping.

The following reference(s) were/was used to create this question:

CISA review manual 2014 Page number 331

http://en.wikipedia.org/wiki/Biometrics


Leave a Reply