Free CIPT Exam Braindumps (page: 21)

Page 20 of 54

Which of the following is a vulnerability of a sensitive biometrics authentication system?

  1. False positives.
  2. False negatives.
  3. Slow recognition speeds.
  4. Theft of finely individualized personal data.

Answer(s): C



Which is the most accurate type of biometrics?

  1. DNA
  2. Voiceprint.
  3. Fingerprint.
  4. Facial recognition.

Answer(s): B


Reference:

https://www.bayometric.com/biometrics-face-finger-iris-palm-voice/



What is true of providers of wireless technology?

  1. They have the legal right in most countries to control and use any data on their systems.
  2. They can see all unencrypted data that crosses the system.
  3. They are typically exempt from data security regulations.
  4. They routinely backup data that crosses their system.

Answer(s): B



What distinguishes a "smart" device?

  1. It can perform multiple data functions simultaneously.
  2. It is programmable by a user without specialized training.
  3. It can reapply access controls stored in its internal memory.
  4. It augments its intelligence with information from the internet.

Answer(s): D


Reference:

https://towardsdatascience.com/what-is-a-smart-device-the-key-concept-of-the- internet-of-things-52da69f6f91b






Post your Comments and Discuss IAPP CIPT exam with other Community members:

CIPT Discussions & Posts