Start learning 50% faster. Sign in now
Biometric authentication leverages unique physiological or behavioral characteristics, such as fingerprints, facial recognition, or iris scans, to verify a user’s identity. It is considered one of the most secure methods of authentication because these traits are nearly impossible to replicate or steal. In environments with high sensitivity, such as financial institutions or military systems, biometric systems are deployed due to their resistance to attacks like phishing or social engineering. Unlike passwords, which can be guessed or stolen, biometrics are inherently tied to the individual, providing a non-repudiable form of identity verification. Why Other Options Are Incorrect: 1. Password-based authentication: Easily compromised through brute force, phishing, or poor user practices. 2. Two-Factor Authentication (2FA): Adds a layer of security but relies on secondary methods like SMS, which can be intercepted. 3. Knowledge-based authentication (KBA): Relies on answers to personal questions, which can be guessed or obtained via social engineering. 4. Token-based authentication: Secure but subject to loss or theft of the physical token. While each method offers varying levels of security, biometrics provides the highest assurance against impersonation and fraud.
Which state/union territory has minimum percentage of area?
Gossypol toxin is produced in
Seed rate of Pennisetum glaucum L. is
Which is not caused by the plant parasitic nematode?
The most reactive among the halogens is-
SSNM relies on ___ R of ______ management
Gummosis is associated with which fruit crop?
What is the full form ICTV?
Seeds of many cultivated species belonging to __________ group
There are over one million companies and organizations in over 170 countries certified to ISO 9001. ISO 9001 mark is related to _____.