What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
A . Micrometrics
B . Macrometrics
C . Biometrics
D . MicroBiometrics
Answer: C
Explanation: Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 35
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund