nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #483

CERTIFIED-IN-CYBERSECURITY Question #483: Real Exam Question with Answer & Explanation

The correct answer is B: They could be considered an invasion of privacy. Biometric authentication methods could be considered an invasion of privacy because they involve collecting and using personal biological data. This can elicit discomfort or concern among some individuals owing to potential misuse or unauthorized access to their personal data (se

Access Controls Concepts

Question

Why might users be uncomfortable when using biometrics as an authentication method?

Options

  • AThey are not always 100% accurate
  • BThey could be considered an invasion of privacy
  • CThey are easy to bypass
  • DThey are less secure than other authentication methods

Explanation

Biometric authentication methods could be considered an invasion of privacy because they involve collecting and using personal biological data. This can elicit discomfort or concern among some individuals owing to potential misuse or unauthorized access to their personal data (see ISC2 Study Guide, Chapter 3, Module 2). For example, an individual using biometric authentication to unlock their smartphone might be uncomfortable with the idea that their facial recognition data is stored somewhere within the device, or possibly on the manufacturer's servers, or employer and could potentially be accessed or misused. Biometric systems are not easy to defeat because they require unique physical characteristics of the user. In fact, they are often more secure because they require physical attributes that are harder to forge or steal than a password or PIN. Finally, it is well known that biometric systems are not always 100% accurate. While true, it is generally not the primary concern among users. While no system is perfect, inaccuracies in biometrics are relatively infrequent and do not form the core reason for user

Topics

#Biometrics#Authentication methods#Privacy concerns#User perception

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions