• About Us
  • All Categories
  • Contact
  • Home
  • Our Authors
  • Partner Quizzes (Testing) > Sirius Computer Solutions
  • Global Knowledge Blog Global Knowledge Blog

--

  • Home
  • All Categories
  • Our Authors
  • About Us
  • Global Knowledge Blog
  • Home
  • All Categories
  • Our Authors
  • About Us

CEH v9 Question of the Week: Retina Scanners

By Guest Authors
February 3, 2016

CEH-v9-QOWBlackWhich of the following is true with regards to retina scanners?

A. Retinal scan is a biometric technique that uses the unique patterns on a person’s retina blood vessels.
B. Retinal scan is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the eyelids of an individual’s eyes, whose complex random patterns are unique and can be seen from some distance.
C. Retinal Scan is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.
D. None of the choices

 

Reveal Answer

The correct answer is A.

A retinal scan is a biometric technique that uses the unique patterns on a person’s retina blood vessels.

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on the video images of one or both of the irises of an individual’s eyes, whose complex random patterns are unique, stable, and can be seen from some distance.

Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.

 

Related Course
Certified Ethical Hacker v9

In this article
  • CEH
  • Certification
  • Cybersecurity
  • CEH v9
  • certified ethical hacker

Join the Conversation Cancel Reply

Will not be published.


RELATED ARTICLES

  • CEH v9 Question of the Week: XSS Scripting

    Which of the following is a countermeasure against XSS scripting?
    By Guest Authors June 8, 2016
  • NSA Reveals Google Hacking Tricks

    Google hacking is something I typically discuss when teaching ethical hacking. It's a key component of the footprinting process. Footprinting is the blueprinting of the security profile of an organization,...
    By Michael Gregg May 30, 2013
  • CEH v9 Question of the Week: TCP/IP Session Hijacking

    TCP/IP session hijacking is carried out in which OSI layer?
    By Guest Authors June 22, 2016

CONNECT WITH US

CATEGORIES

Back to top

© 2019 Global Knowledge Training LLC. All Rights Reserved.  Site Admin | Logout