CISA Certified Information Systems Auditor – Question1641

The use of residual biometric information to gain unauthorized access is an example of which of the following attacks?

A.
Replay
B. Brute force
C. Cryptographic
D. Mimic

Correct Answer: A

Explanation:

Explanation:
Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be reused by an attacker to gain unauthorized access. A brute force attack involves feeding the biometric capture device numerous different biometric samples. A cryptographic attack targets the algorithm or the encrypted data, in a mimic attack, the attacker reproduces characteristics similar to those of the enrolled user, such as forging a signature or imitating a voice.