Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 1 Question 14 Discussion

Actual exam question for ISC2's Information Systems Security Architecture Professional exam
Question #: 14
Topic #: 1
[All Information Systems Security Architecture Professional Questions]

Which of the following authentication methods is based on physical appearance of a user?

Show Suggested Answer Hide Answer
Suggested Answer: B

biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming

more common in the business environment.

Answer option A is incorrect. Key fobs are security devices used by telecommuters to provide one part of a three way match for a user to log

on to a secured network.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel