A FAR is the probability that a biometric system can incorrectly identify an individual or fail to reject an imposter. The FAR given normally assumes passive imposter attempts, and a low FAR is better. The FAR is stated as the ratio of the number of false acceptances divided by the number of identification attempts.
An FRR is the probability that a biometric system will fail to identify an individual or verify the legitimate claimed identity of an individual. A low FRR is better. The FRR is stated as the ratio of the number of false rejections divided by the number of identification attempts.
118. In biometrics-based identification and authentication techniques, which of the following indicates that technology used in a biometric system is
a.
Low false acceptance rateb.
Low false rejection ratec.
High false acceptance rated.
High false rejection rateA false acceptance rate (FAR) is the probability that a biometric system will incorrectly identify an individual or fail to reject an imposter. The FAR given normally assumes passive imposter attempts, and a low FAR is better and a high FAR is an indication of a poorly operating biometric system, not related to technology. The FAR is stated as the ratio of the number of false acceptances divided by the number of identification attempts.
A FRR is the probability that a biometric system will fail to identify an individual or verify the legitimate claimed identity of an individual. A low FRR is better. The FRR is stated as the ratio of the number of false rejections divided by the number of identification attempts.
119. In biometrics-based identification and authentication techniques, what is a countermeasure to mitigate the threat of identity spoofing?
a.
Liveness detectionb.
Digital signaturesc.
Rejecting exact matchesd.
Session lock120. In biometrics-based identification and authentication techniques, what is a countermeasure to mitigate the threat of impersonation?
a.
Liveness detectionb.
Digital signaturesc.
Rejecting exact matchesd.
Session lock121. In biometrics-based identification and authentication techniques, what is a countermeasure to mitigate the threat of replay attack?
a.
Liveness detectionb.
Digital signaturesc.
Rejecting exact matchesd.
Session lock122. In biometrics-based identification and authentication techniques, what is a countermeasure to mitigate the threat of a security breach from unsuccessful authentication attempts?
a.
Liveness detectionb.
Digital signaturesc.
Rejecting exact matchesd.
Session lock