Questions
Now it's time to check your knowledge. Select the best response, and then check your answers, found in the Assessment section at the end of the book:
- _____ recognition can work without the subject having any knowledge they are being observed, so this type of identification can be used for threat management.
a. Voice
b. Retinal
c. Facial
d. Cloud
- If you need to implement a system in a remote office with a limited network, you'll need to use a _____ system.
a. standalone
b. cloud
c. networked
d. scanning
- When installing a biometric system, in order to maintain the biometric workflow, there may be a need to use a _____ product so that the proprietary system can talk to the backend.
a. malware
b. cloudware
c. scan-box
d. middleware
- A(n) ___ is a Type 1 error.
a. FMR
b. FNMR
c. FTE
d. CER
- Adding a second biometric identifier, either as a required second authenticator, or as an alternative to another biometric, is called ____ biometric authentication.
a. far...