Biometrics Systems Engineering Question Paper
Biometrics Systems Engineering
Course:Bachelor Of Science In Information Technology
Institution: Kca University question papers
Exam Year:2011
UNIVERSITY EXAMINATIONS: 2010/2011
THIRD YEAR EXAMINATION FOR THE DEGREE OF BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY
BIT 4205: BIOMETRICS SYSTEMS ENGINEERING
DATE: APRIL 2011 TIME: 2 HOURS
INSTRUCTIONS: Answer question ONE and any other TWO questions
QUESTION ONE
a) When biometrics systems are used for identification or authentication there are four possible
outcomes. Identify these outcomes (4 Marks)
b) The use of biometrics raises various public concerns over privacy of biometric data. Discuss at
least five privacy issues raised regarding biometrics. (5 Marks)
c) What factors contribute to a biometric characteristic''s development? (3 Marks)
d) What are the advantages of biometric verification over biometric identification (4 Marks)
e) What makes up a biometric authentication system? (3 Marks)
f) Discuss the specifications of biometrics standards (9 Marks)
g) The data collection subsystem contains an acquisition device with a sensor or reader . Identify
any four (2 Marks)
QUESTION TWO
a) Using the fingerprint scanning discuss how the “zoo” concept can be used in Setting variable
matching threshold (8 Marks)
2
b) Biometrics is an identification technology widely used in physical access control and forensics.
Cryptography is the science for information security. People generally agreed that biometric
information needs to be protected with cryptography. Discuss the benefits of biometrics and
cryptography (8 Marks)
c) Using an example distinguish between positive and negative identification (4 Marks)
QUESTION THREE
a) Ideally some form of “liveness” test should also be incorporated in systems to minimise or defeat
attempts to circumvent or compromise the system. Specific liveness detection measures vary from
technology to technology but all liveness detection techniques fall into one of three categories.
Discuss these three categories using relevant illustrations. (9 Marks)
b) As any other system and technology the biometric technology has its vulnerabilities. As a security
expert in biometrics you have been requested to prepare a presentation on attacks on biometric
authentication system for your colleagues. Describe three types of attacks that you shall include in
your presentation (9 Marks)
c) Identify two reasons for biometric characteristic variation over time (2 Marks)
QUESTION FOUR
a) There are some key business and user convenience drivers for the implementation of biometric
systems however there are some disadvantages and concerns with the implementation of biometric
systems. Discuss these advantages and constraints (10 Marks)
b) Discuss how the probability distribution function is measured for a biometric system''s authorized
and unauthorized users (10 Marks)
QUESTION FIVE
a) Discuss how the manner of formation of biometrics characteristics influence the usefulness of
biometric characteristics (8 Marks)
b) Discuss the measures that reflect the effectiveness of a biometric authentication system
(8 Marks)
3
c) Live scan image acquisition systems are based on four technologies. Describe them (4 marks)
More Question Papers
Exams With Marking Schemes