Question
Which of the following techniques is considered the most
secure method of user authentication in a highly sensitive environment?Solution
Biometric authentication leverages unique physiological or behavioral characteristics, such as fingerprints, facial recognition, or iris scans, to verify a user’s identity. It is considered one of the most secure methods of authentication because these traits are nearly impossible to replicate or steal. In environments with high sensitivity, such as financial institutions or military systems, biometric systems are deployed due to their resistance to attacks like phishing or social engineering. Unlike passwords, which can be guessed or stolen, biometrics are inherently tied to the individual, providing a non-repudiable form of identity verification. Why Other Options Are Incorrect: 1. Password-based authentication: Easily compromised through brute force, phishing, or poor user practices. 2. Two-Factor Authentication (2FA): Adds a layer of security but relies on secondary methods like SMS, which can be intercepted. 3. Knowledge-based authentication (KBA): Relies on answers to personal questions, which can be guessed or obtained via social engineering. 4. Token-based authentication: Secure but subject to loss or theft of the physical token. While each method offers varying levels of security, biometrics provides the highest assurance against impersonation and fraud.
The main aim of these SDGs is to end poverty, protect the planet and ensure that all people enjoy peace and prosperity by __________.
Which of the following is a derivative instrument?
What percentage did Indian startup funding decrease by in 2023 compared to 2022, according to data from Tracxn?
Which of the following public sector bank has launched the Aarogyam healthcare business loan?
Identify the financial entity which does not belong to the World Bank Group ?
At the end of the year, the c ost of a partly finished item  was  Rs. 50 0 . The item  can be finished next year by  a further expenditure o...
The ability of a leader to tolerate ambiguity, uncertainty, and doubt without the need for immediate answers or solutions is known as __ ________ Â
Banks shall make provisions, with effect from the year ending March 31, 2003, on the net funded country exposures on a graded scale ranging from 0.25 to...
All the following will be included in the company’s operating activities except:
In projects financed under consortium arrangements, where the aggregate exposure of the participant lenders to the project is upto Rs.1,500 crores, no ...