ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 20 - 112-51 discussion

Report
Export

Alice was working on her major project; she saved all her confidential files and locked her laptop. Bob wanted to access Alice's laptop for his personal use but was unable to access the laptop due to biometric authentication.

Which of the following network defense approaches was employed by Alice on her laptop?

A.
Retrospective approach
Answers
A.
Retrospective approach
B.
Preventive approach
Answers
B.
Preventive approach
C.
Reactive approach
Answers
C.
Reactive approach
D.
Proactive approach
Answers
D.
Proactive approach
Suggested answer: B

Explanation:

The network defense approach that was employed by Alice on her laptop was the preventive approach. The preventive approach aims to stop or deter potential attacks before they happen by implementing security measures that reduce the attack surface and increase the difficulty of exploitation. Biometric authentication is an example of a preventive measure that uses a physical characteristic, such as a fingerprint, iris, or face, to verify the identity of the user and grant access to the device or system. Biometric authentication is more secure than traditional methods, such as passwords or PINs, because it is harder to forge, guess, or steal. By locking her laptop and using biometric authentication, Alice prevented Bob from accessing her laptop and her confidential files without her permission.

Reference:

Network Defense Essentials Courseware, EC-Council, 2020, pp. 1-7 to 1-8

What is Biometric Authentication?, Norton, July 29, 2020

An introduction to network defense basics, Enable Sysadmin, November 26, 2019

asked 18/09/2024
Tebello Mofokeng
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first