What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
Answer options:
A. Micrometrics
B. Macrometrics
C. Biometrics
D. MicroBiometrics
Answer correct:
C
Source: KRUTZ, Ronald L. & VINES, Russel
D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 35.