PrepAway - Latest Free Exam Questions & Answers

which of the following attacks?

The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?

PrepAway - Latest Free Exam Questions & Answers

A.
Replay

B.
Brute force

C.
Cryptographic

D.
Mimic

Explanation:

Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be
reused by an attacker to gain unauthorized access. A brute force attack involves feeding the
biometric capture device numerous different biometric samples. A cryptographic attack targets the
algorithm or the encrypted data, in a mimic attack, the attacker reproduces characteristics similar
to those of the enrolled user, such as forging a signature or imitating a voice.


Leave a Reply