Last visit was: 24 Apr 2024, 16:50 It is currently 24 Apr 2024, 16:50

Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
SORT BY:
Date
Tags:
Show Tags
Hide Tags
Math Expert
Joined: 02 Sep 2009
Posts: 92900
Own Kudos [?]: 618811 [8]
Given Kudos: 81588
Send PM
Manager
Manager
Joined: 16 Apr 2019
Posts: 201
Own Kudos [?]: 286 [3]
Given Kudos: 48
Location: India
Concentration: Marketing, Sustainability
GPA: 4
WE:Information Technology (Computer Software)
Send PM
Senior Manager
Senior Manager
Joined: 07 Jan 2018
Posts: 268
Own Kudos [?]: 264 [1]
Given Kudos: 161
Location: India
GMAT 1: 710 Q49 V38
Send PM
Manager
Manager
Joined: 30 Nov 2018
Posts: 64
Own Kudos [?]: 8 [0]
Given Kudos: 194
Send PM
Re: A standard problem for computer security is that passwords that have [#permalink]
bidskamikaze wrote:
The OA seems confusing, as it doesn't address the core problem with keyboard passwords: That they are easy to steal or guess. Choice A seems to be a better choice.
Experts please help with this one!


I agree with this A does seem like a better option as well as applicable
Intern
Intern
Joined: 26 Jan 2021
Posts: 5
Own Kudos [?]: 1 [0]
Given Kudos: 10
Send PM
Re: A standard problem for computer security is that passwords that have [#permalink]
Someone, please explain why A is wrong.
And how D is not vaguely assumed.

Is it talking about the scenario when an authorized person is suffering from a Cold?
LBS Moderator
Joined: 30 Oct 2019
Posts: 836
Own Kudos [?]: 775 [0]
Given Kudos: 1577
Send PM
Re: A standard problem for computer security is that passwords that have [#permalink]
anshulasthana wrote:
Someone, please explain why A is wrong.
And how D is not vaguely assumed.

Is it talking about the scenario when an authorized person is suffering from a Cold?

D is correct. Think in terms of Venn diagrams.

In the text this is mentioned
", the system never incorrectly accepted someone seeking access to the computer's data"

But this can mean two things -
(1) It stopped BAD guys (SUCCESS)
(2) It stopped GOOD guys (FAIL)

**here BAD = not a match, people not matching the password/description
**GOOD = a match, and has right of entry to the system

Situation (2) is exactly what D is -
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access

Hope this helps.
Stern School Moderator
Joined: 26 May 2020
Status:Spirited
Posts: 634
Own Kudos [?]: 539 [0]
Given Kudos: 219
Concentration: General Management, Technology
WE:Analyst (Computer Software)
Send PM
Re: A standard problem for computer security is that passwords that have [#permalink]
I got confused between B and D .

But realized that key to read the highlighted portion ..

the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting
=> then there will be a way of giving access to those people who are entitled to access and to no one else.

To achieve the highlighted conclusion the assumption is the people who are entitled to get access are not stopped as well .



A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it

(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way
Manager
Manager
Joined: 25 Oct 2017
Posts: 57
Own Kudos [?]: 18 [0]
Given Kudos: 603
GMAT Focus 1:
655 Q87 V80 DI80
GMAT 1: 690 Q49 V35
Send PM
A standard problem for computer security is that passwords that have [#permalink]
Bunuel wrote:
A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it

(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way

No proper explanation for answer choice A is provided, so I'll take a stab at it.

­Choice A

A is incorrect because the comparison is a totally valid comparison, keeping in context the given problem with keyboard system. It is NOT expected that the voice recognition system overcomes ALL the vulnerabilities in the world for password systems, especially since it is stated in the argument - "A new system that relies on recognizing the voices of authorized users apparently avoids this problem" - the problem being keyboard passwords are comparatively easy to steal or guess for unauthorized users. So the voice recognition system needs to avoid only this problem for the conclusion to hold - we don't care about any "other" problems the voice recognition system may have. Hence, this choice is an invalid claim.

Choice D

Clearly, it addresses the possibility of going against the conclusion by contradicting the bolded part - "...there will be a way of giving access to those people who are entitled to access and to no one else."

Hope this helps somebody.

 ­
GMAT Club Bot
A standard problem for computer security is that passwords that have [#permalink]
Moderators:
GMAT Club Verbal Expert
6920 posts
GMAT Club Verbal Expert
238 posts
CR Forum Moderator
832 posts

Powered by phpBB © phpBB Group | Emoji artwork provided by EmojiOne