Filters
Question type

Study Flashcards

The ________ controls the amount of light that enters the eye.

Correct Answer

verifed

verified

The iris is responsible for obtaining a clear picture of what a person is actually seeing.

A) True
B) False

Correct Answer

verifed

verified

An iris scan user can stand a good distance away from the camera and still procure a viable image.

A) True
B) False

Correct Answer

verifed

verified

One of the key advantages of retina scans is that the user can stand a good distance away from the camera and still produce a viable image.

A) True
B) False

Correct Answer

verifed

verified

A 2D Gabor wavelet filters the iris into multiple partitions known as ________.

Correct Answer

verifed

verified

For a retina scan, the feature extraction module may use equations that judge the distance between ________ fibers in the eye.

Correct Answer

verifed

verified

A facial recognition system can be easily tricked by a ________ picture.

Correct Answer

verifed

verified

The Interstate Photo System (IPS)has a criminal database containing millions of side-facing mugshot photos of individuals with tenprints on file.

A) True
B) False

Correct Answer

verifed

verified

A computer system that captures and analyzes complex data extracted from an image of an iris and compares it to results in a database is known as ________.

Correct Answer

verifed

verified

The ________ process captures a person's biometric data and stores it in a database for later use.

Correct Answer

verifed

verified

What is the primary disadvantage of Principal Component Analysis?


A) A full frontal face image is needed to be a viable sample.
B) The image must be taken at a distance of no further than three feet away.
C) It is not compatible with most facial recognition software.
D) It is less precise and accurate than other analyses.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Before Touch ID, data was not significantly more vulnerable to password attacks, even when a phone had been stolen or breached.

A) True
B) False

Correct Answer

verifed

verified

The FBI has contracted the help of ________ to implement and maintain all facial recognition biometric systems.

Correct Answer

verifed

verified

Match the word in Column 1 to its definition in Column 2. Each answer can only be used once. A)An internal unit of the FBI that provides face recognition capabilities among other features to support active FBI investigations B)A form of biometrics that focuses on identifying humans through their unique physiological traits such as fingerprints, hands, iris, retina, and facial scans C)A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and comparing it against an existing database of enrolled traits D)A technique that creates matrices of human faces and uses complex mathematical equations to generate templates for individual features that are digitally stored E)Biometric systems popular with law enforcement that are capable of identifying someone out of a crowd by scanning select biometric characteristics into a database F)The process of capturing a person's biometric data and storing it in a database for later use G)A technique used in the reconstruction and analysis of a human face through which thousands of stored images of faces are used and placed over the face in question H)A model-based facial recognition program that uses a sequence of graphs to map the nonlinear relationships of features on the face I)An appearance-based technique in which an individual's face is placed on a vector and lines from one feature to another are analyzed J)This module is responsible for finding patterns in the traits extracted by the biometric sensor using mathematical equations K)A database maintained by the FBI that allows for officers to fingerprint individuals they come in contact with and quickly detect whether or not they pose a threat L)Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system M)A database maintained by the FBI that contains millions of palm prints to be used in criminal investigations and processes N)A form of biometrics that focuses on identifying humans through unique behavioral or mental patterns they exhibit, such as handwriting, keystrokes, or gait recognition O)A criminal database containing millions of front-facing mugshot photos of individuals with tenprints on file P)A process to analyze and store information on a human iris that uses the extracted data from a human iris and processes it through a quantitation stage that produces a binary iris code for later comparison -Physiological biometrics

Correct Answer

verifed

verified

Biometric systems use different algorithms and steps to accomplish what each is designed to do.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered a behavioral biometric?


A) Handwriting
B) Keystroke patterns
C) Gait recognition
D) Facial scan

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Match the word in Column 1 to its definition in Column 2. Each answer can only be used once. A)An internal unit of the FBI that provides face recognition capabilities among other features to support active FBI investigations B)A form of biometrics that focuses on identifying humans through their unique physiological traits such as fingerprints, hands, iris, retina, and facial scans C)A biometric system that can distinguish between subjects by analyzing a biometric trait of one person and comparing it against an existing database of enrolled traits D)A technique that creates matrices of human faces and uses complex mathematical equations to generate templates for individual features that are digitally stored E)Biometric systems popular with law enforcement that are capable of identifying someone out of a crowd by scanning select biometric characteristics into a database F)The process of capturing a person's biometric data and storing it in a database for later use G)A technique used in the reconstruction and analysis of a human face through which thousands of stored images of faces are used and placed over the face in question H)A model-based facial recognition program that uses a sequence of graphs to map the nonlinear relationships of features on the face I)An appearance-based technique in which an individual's face is placed on a vector and lines from one feature to another are analyzed J)This module is responsible for finding patterns in the traits extracted by the biometric sensor using mathematical equations K)A database maintained by the FBI that allows for officers to fingerprint individuals they come in contact with and quickly detect whether or not they pose a threat L)Responsible for saving all of the raw data produced by feature extraction and putting it into a simple and easy to read format for the system M)A database maintained by the FBI that contains millions of palm prints to be used in criminal investigations and processes N)A form of biometrics that focuses on identifying humans through unique behavioral or mental patterns they exhibit, such as handwriting, keystrokes, or gait recognition O)A criminal database containing millions of front-facing mugshot photos of individuals with tenprints on file P)A process to analyze and store information on a human iris that uses the extracted data from a human iris and processes it through a quantitation stage that produces a binary iris code for later comparison -Interstate Photo System (IPS)

Correct Answer

verifed

verified

NGI provides a positive or negative identification of the suspect.

A) True
B) False

Correct Answer

verifed

verified

Which facial recognition database would most likely contain the photos of criminals?


A) FACE
B) NPPS
C) IPS
D) MorphoTrust

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

There are three main functions of biometrics.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 92

Related Exams

Show Answer