You work in the IT department of a highly secure government
You work in the IT department of a highly secure government facility, and you are evaluating different biometric methods of computer authentication. Of the following, which method of biometric authentication is considered the least reliable?
A. Fingerprint scan
B. Hand geometry scan
C. Retina scan
D. Voice analysis
Solution
D. While voice recognition software can’t be fooled by a person imitating the voice of another person, a recording of the authorized person’s voice could be used to authenticate.
