This is a Free Service provided by Why Fund Inc.
(a 501 C3 NonProfit) We thank you
for your donation!
54 Multiple choice questions
1. Consists of the hardware in a biometric device that converts biometric input into
electrical signals and conveys this information to the attached computer, such as a
fingerprint sensor. (30)
1. Arch
2. Sensor
3. Identity
4. Mimic
b. The automated process of locating and encoding distinctive characteristics from a
biometric sample in order to generate a template. (31)
1. Verification
2. Extraction
3. Feature Extraction
4. Signature Verification
b. Refers to a fingerprint capture device that electronically captures fingerprint images
using a sensor (rather than scanning ink-based fingerprint images on a card or lifting
latent fingerprints from a surface). (30)
1. Live Scan
2. Bifurcation
3. Live Capture
4. Identity
b. A biometric task where an unidentified individual is known to be in the database and
the system attempts to determine his/her identity. (31)
1. Closed-set Identification
2. Voice Verification
3. Biometric Identification
4. Open-set Identification
b. Used to collect both an individual's personal and demographic information along with
flat and rolled ink impression fingerprint images. (35)
1. Extraction
2. Faceprint
3. 10-print card
4. Live Scan
b. A document used as an original source of identity to apply for (or breed) other forms
of identity credentials. (29)
1. Breeder Documents
2. Extraction
3. Nodal Points
4. Live Scan
b. A value returned by a biometric algorithm indicating the degree of difference between
a biometric sample and a reference. (32)
1. Difference Score
2. Sensor
3. 10-print card
4. Live Scan
5.
b. The number of non-corresponding digits in a string of binary digits; it is used to
measure dissimilarity. (32)
1. Live Scan
2. Adjustable
3. Characteristic
4. Hamming Distance
b. Every face has numerous, distinguishable landmarks, the different peaks and valleys
that make up facial features. (46)
1. Nodal Points
2. Faceprint
3. Minutiae points
4. Modality
b. A proprietary finger scanning technique. (39)
1. Bifurcation
2. Recognition
3. Extraction
4. Autocorrelation
b. The process used to recognize an individual's handwritten signature. (50)
1. Signature Dynamics
2. Voice Verification
3. Feature Extraction
4. Signature Verification
b. A biometric modality that uses the cadence of an individual's typing pattern for
recognition. (52)
1. Iris recognition
2. Thermograms
3. Keystroke Dynamics
4. Verification
b. A biometric task that more closely follows operational biometric system conditions to
1) determine if someone is in a database and 2) find the record of the individual in the
database. See watch-list. (31)
1. Voice Verification
2. Closed-set Identification
3. Open-set Identification
4. Biometric Identification
b. A type or class of biometric system, such as face recognition, fingerprint recognition,
iris recognition, etc. (33)
1. Nodal Points
2. Modality
3. Model
4. Identity
b. The transferred impression of a friction ridge detail that is not readily visible; a
generic term used for a questioned friction ridge detail. (34)
1. Faceprint
2. Autocorrelation
3. Latent Fingerprint
4. Minutiae points
b. Requires the subject to look into a reticle and focus on a visible target while the scan
is completed. (44)
1. Ridge Ending
2. Retinal Scanning
3. Iris Scanning
4. Live Scan
b. Synonym for verification. (29)
1. One-to-one
2. Comparison
3. One-to-many
4. Sensor
b. A detailed description or scaled representation of one component of a larger system
that can be created, operated, and analyzed to predict actual operational characteristics of
the final produced component. (31)
1. Mimic
2. Model
3. Modality
4. Arch
b. The process of collecting a biometric sample from an individual via a sensor. (30)
1. Iris recognition
2. Feature Extraction
3. Capture or Submission
4. Recognition
b. A method of biometric identification and pattern recognition that is used to determine
the identity of the subject. (41)
1. Ridge Ending
2. Iris recognition
3. Iris Scanning
4. Live Scan
b. A reflection of an individual's psychological makeup, although physical traits, such as
size and gender, have a major influence. (29)
1. Modality
2. Behavioral
3. Sensor
4. Thermograms
b. The identifiable, unprocessed image or recording of a physiological or behavioral
characteristic, acquired during submission, used to generate biometric templates. Also
referred to as biometric data. (30)
1. Bifurcation
2. Biometric Sample
3. Comparison
4. Similarity Score
b. A distinguishing feature or attribute. (28)
1. Faceprint
2. Characteristic
3. Comparison
4. Extraction
b. A scan of a fingerprint or palm print taken directly from a subject's hand. (35)
1. Sensor
2. Live Capture
3. Mimic
4. Live Scan
b. Occurs when the friction ridges enter from one side, make a rise in the center, and exit
on the opposite side. (34).
1. Arch
2. Mimic
3. Model
4. Sensor
b. Synonym for identification. (29)
1. One-to-one
2. One-to-many
3. Thermograms
4. Identity
b. A user setting for biometric systems operating in the verification or open-set
identification (watch list) tasks. (32)
1. Model
2. Arch
3. Threshold
4. Sensor
b. The point where a friction ridge begins, terminates, or splits into two or more ridges.
Minutiae are friction ridge characteristics that are used to individualize a fingerprint
image. (34)
1. Bifurcation
2. Friction Ridge
3. Minutiae points
4. Faceprint
b. The ridges on the skin of the fingers, toes, palms, and soles of the feet that make
contact with an incident surface under normal touch. On the fingers, the unique patterns
formed by friction ridges make up fingerprints. (34)
1. Recognition
2. Ridge Ending
3. Extraction
4. Friction Ridge
b. The generic term used in the description of biometric systems (e.g., face recognition
or iris recognition) relating to their fundamental function. (31)
1. Extraction
2. Verification
3. Recognition
4. Iris recognition
b. The process of comparing a biometric reference with a previously stored reference or
references in order to make an identification or verification decision. (31)
1. Recognition
2. Extraction
3. Sensor
4. Comparison
b. Represents a face in the database. (47)
1. Nodal Points
2. Spoofing
3. Faceprint
4. Arch
b. This is a subset of physical and/or behavioral characteristics by which an individual is
uniquely recognizable. (29)
1. Modality
2. Live Scan
3. Sensor
4. Identity
b. The point in a fingerprint where a ridge divides or splits to form two ridges that
continue past the point of division for a distance that is at least equal to the spacing
between adjacent ridges at the point of bifurcation. (34)
1. Verification
2. Extraction
3. Bifurcation
4. Recognition
b. A technique used to ensure that the biometric sample submitted is from an end user.
(30)
1. Live Scan
2. Open-set Identification
3. Iris recognition
4. Liveness Detection
b. A card identifying its holder and issuer which may carry data required as input for the
intended use of the card and for transactions based thereon. (29)
1. Identification Card (ID)
2. Verification
3. Friction Ridge
4. Latent Fingerprint
b. The process by which the biometric sample captured in the previous block is
transformed into an electronic representation. During enrollment this electronic
representation is known as the biometric template. During the authentication process, it
is known as the live sample. (31)
1. Recognition
2. Bifurcation
3. Verification
4. Extraction
b. A biometric modality that uses an image of the physical structure of an individual's
iris for recognition purposes. (42)
1. Recognition
2. Iris recognition
3. Iris Scanning
4. Palm print recognition
b. The process of capturing a biometric sample by an interaction between an end user
and a biometric system. (35)
1. Live Scan
2. Live Capture
3. Bifurcation
4. Identity
b. An image of an object taken with an infrared camera that shows surface temperature
variations.(53)
1. One-to-many
2. Threshold
3. Behavioral
4. Thermograms
b. The presentation of live biometric measure in an attempt to fraudulently impersonate
someone other than the submitter. (30)
1. Mimic
2. Model
3. Spoofing
4. Arch
b. The process of confirming or denying that a claimed identity is correct by comparing
the credentials. (30)
1. Voice Verification
2. Verification
3. Bifurcation
4. Extraction
b. A relatively stable human physical characteristic, such as a fingerprint, hand
silhouette, iris pattern, or blood vessel pattern on the back of the eye. This type of
measurement is unchanging and unalterable without significant duress. (29)
1. Threshold
2. Behavioral
3. Physiological
4. Spoofing
b. The ability to fool a biometric sensor into recognizing an illegitimate user as a
legitimate user (verification) or into misidentifying someone who is in the database. (30)
1. Faceprint
2. Spoofing
3. Identity
4. Mimic
b. Uses a palette of about 150 facial abstractions, and compares the captured face with
these archetypal abstract faces. (46)
1. Liveness Detection
2. Eigenface Comparison
3. Iris recognition
4. Comparison
b. The one-to-many process of comparing a submitted biometric sample against all
biometric reference templates on file to determine whether it matches any of the
templates. (29)
1. Signature Verification
2. Closed-set Identification
3. Biometric Identification
4. Open-set Identification
b. A behavioral biometric modality that analyzes dynamic characteristics of an
individual's signature. (50)
1. Keystroke Dynamics
2. Signature Dynamics
3. Biometric Sample
4. Signature Verification
b. A biometric modality that uses the physical structure of an individual's palm print for
recognition purposes. (39)
1. Liveness Detection
2. Fingerprint Recognition
3. Recognition
4. Palm print recognition
b. The threshold is _________ so that the biometric system can be more or less strict,
depending on the requirements of any given biometric application. (32)
1. Arch
2. Adjustable
3. Threshold
4. One-to-one
b. A potentially interesting technique because considerable voice communication takes
place with regard to everyday business transactions. (49)
1. Bifurcation
2. Voice Verification
3. Signature Verification
4. Verification
b. A biometric modality that uses the physical structure of an individual's fingerprint for
identification purposes. (34)
1. Recognition
2. Fingerprint Recognition
3. Palm print recognition
4. Iris recognition
b. A minutiae point at the ending of a friction ridge. (34)
1. Live Scan
2. Identity
3. Iris Scanning
4. Ridge Ending
b. A value returned by a biometric algorithm that indicates the degree of similarity or
correlation between a biometric sample and a reference. (32)
1. Comparison
2. Modality
3. Difference Score
4. Similarity Score
b. Consists of a row/column configuration of tiny metal electrodes. Every column is
linked to a pair of sample-and-hold circuits. The fingerprint image is recorded in
sequence, row by row, as each metal electrode acts as one capacitor plate and the
contacting finger acts as the second plate. (38)
1. Sensor
2. Comparison
3. Live Scan
4. Capacitive Sensor
1.What is Biometrics
A. The automated system uses behavioral and physiological characteristics to determine or
veiry an identity.
B. It recognizes individuals based on their inherent physical or behavioral characteristics.
C. (A) & (B).
D. None of these.
2. What does biometrics system find based on user identity?
A. Who We are Rather than by
B. What you possess such as identity (ID Card)
C. Or what you remember such as a password.
D. All of above.
3. What are the Biometric Functionalities?
A. Identification.
B. Verification.
C. (A) and (B).
D. None of these.
4. What are the necessary Biometric Attributes or Factor?
A. Universality and Uniqueness.
B. Permanence, Collectability and Acceptability.
C. (A) and (B).
D. None of these.
5. What is the part of biometrics system?
A. It consists of two parts: Part
(A) • Biometric Reader(Sensor) • Feature Extractor • Feature Matcher (B) Part
(B): It Consists of two subsystems • Enrollment • Authentication
C. (A ) and (B).
D. None of these.
Here is the list of correct answers with explanations to our 2nd Biometric
True/False Quiz.
1. True or False – When biometric credentials are captured, it stores an image and then
later uses it for confirming my identity.
2. True or False – Science fiction movies inspired the growth of biometric technology.
3. True or False – Fingerprints are the most reliable biometric modality.
4. True or False – 195,000+ annual U.S. deaths are due to medical errors – 60% were
caused by failure to correctly identify the patient.
5. Fingerprint identification methodology was first invented in 1892.
6. True or False – Stolen body parts can be used to fool a biometric scanning device.
7. True or False – Biometric employee attendance systems are only important for large
companies.
8. True or False – I can’t afford a biometric system, it’s too expensive.
9. True or False – Biometric technology identifies a person based on what they have or
what they know.
10. True or False – It is easy for someone to fake my fingerprint and fool a biometric
reader to think it’s me.
1.In contrast to physiological biometrics, which of the following is an example of a behavioral biometric?
face
fingerprint
retina
signature
2. The five attributes necessary to make a biometric practical are universality, uniqueness,
permanence, collectability, and acceptance. Which of the following biometrics is considered the
least acceptable?
face
fingerprint
retina
signature
3. Which of the following biometrics is the least commonly used?
DNA
signature
face
fingerprint
4. The keystroke biometric is:
a physiological biometric and one of the six commonly used biometrics
a behavioral biometric and one of the six commonly used biometrics
a physiological biometric but not one of the six commonly used biometrics
a behavioral biometric but not one of the six commonly used biometrics
5. Which of the following design specifications of biometric systems is likely the most difficult to
estimate a priori?
system accuracy
computational speed
exception handling rate
system cost
6. Which of the following authentication protocols is the most widely used today?
possession (what you have)
knowledge (what you know)
combination of possession and knowledge
biometrics (something unique about the user)
7. Which of the following authentication protocols requires pattern recognition/machine learning
techniques?
possession (what you have)
knowledge (what you know)
combination of possession and knowledge
biometrics (something unique about the user)
8. For which of the six most widely used biometrics does the sensing device typically distort the pattern
that is being sensed?
fingerprint
face
voice
iris
hand geometry
signature
9. For which of the six most widely used biometrics is there a clear definition of levels of sophistication for
impersonation?
fingerprint
face
voice
iris
hand geometry
signature
10. For which of the six most widely used biometrics is there ubiquitous existing sensing hardware for
applications?
fingerprint
face
voice
iris
hand geometry
signature