Thoroughly answer the following questions; 1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights. 2. Describe the differences between authentication and privacy and what mech

Thoroughly answer the following questions; 1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights. 2. Describe the differences between authentication and privacy and what mech

Thoroughly answer the following questions;

1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights.

2. Describe the differences between authentication and privacy and what mechanisms WLANs can use to ensure both.

3. Compare how 802.11a works and list the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the list should have a high level of technical detail.