ISACA Exam Questions

which of the following attacks?

The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?

A.
Replay

B.
Brute force

C.
Cryptographic

D.
Mimic

Explanation:

Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be
reused by an attacker to gain unauthorized access. A brute force attack involves feeding the
biometric capture device numerous different biometric samples. A cryptographic attack targets the
algorithm or the encrypted data, in a mimic attack, the attacker reproduces characteristics similar
to those of the enrolled user, such as forging a signature or imitating a voice.