1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
8

Explain why, for the biometric authentication protocols, the biometric capture device is authenticated in the case of static bio

metric but not authenticated for a dynamic biometric
Computers and Technology
1 answer:
kotykmax [81]3 years ago
5 0

Answer:

The static biometric is not as secure as the dynamic biometric, because the device could be random and not registered in the network, and the generated data from the scanner is less encrypted than for the dynamic biometric.

Explanation:

Biometrics are computer devices that read human or animal biological analog features and convert them into digital data. The static and dynamic biometric scanners are used in a network to authenticated account users. The dynamic biometric is registered in the network and sends encrypted data to the server, but the static biometric is not a registered device in the network.

You might be interested in
Im on Edge 2021 and i did an assignment that says, "Processing." The assignment won't give me a grade and says it is overdue. wh
lora16 [44]

Answer:

you could send a email to your teacher to fix the problem

Explanation:

3 0
3 years ago
In general, a presentation to kindergarteners should be less abstract than a presentation to corporate executives
Salsk061 [2.6K]
Make the presentation goofy so they will be more into it . your welcome
4 0
3 years ago
Read 2 more answers
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Gnom [1K]

Answer:

The correct answer to the following question will be "Telnet provides a piece of login information in simple text, while this type of information is encrypted by SSH".

Explanation:

If you're using a distribution of Linux for a long period and maybe you're no longer a newbie on Linux, you might also have come through words such as telnet or SSH.

  • Today SSH is just the main application for Access to the internet between connected devices and repositories.
  • Telnet was the shared abbreviation of networking and communications and is the most well-known networking application for the UNIX framework.

So, it's the right answer.

7 0
3 years ago
Dan wants to check the layout of his web page content. What is the best way in which he can do this?
KatRina [158]
The answer is b I hope it helped
4 0
3 years ago
Read 2 more answers
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Other questions:
  • Which presentation software element can you use to control the speed between slides in a presentation?
    13·2 answers
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • Which device uses radio waves? ceiling fan microwave oven air conditioner x-ray machine?
    7·1 answer
  • What is the output of the following code: ​ for (loop = 1; loop <3; ++loop) System.out.print(1); for (loop2 = 1; loop2<3;
    5·1 answer
  • A hard drive with a spin speed of 7200 RPM, commences spinning at time = 0, at time = 1.326 ms what is the angle that the disk h
    14·1 answer
  • Write an algorithm to sum to values
    11·1 answer
  • 6.7 — Trickier Trap 4
    7·2 answers
  • Who is primarily responsible for ensuring cybersecurity in society? Select 3 options.
    15·1 answer
  • Jeremy knows that there is a keyboard shortcut in Word, but he does not know what it is. What should Jeremy do to find out what
    14·1 answer
  • Which type of input devices used in big hero 6 movie
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!