Last visit was: 19 Nov 2025, 02:36 It is currently 19 Nov 2025, 02:36
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
jefferyk
Joined: 15 Jul 2020
Last visit: 18 Sep 2020
Posts: 23
Own Kudos:
111
 [8]
Given Kudos: 55
Posts: 23
Kudos: 111
 [8]
2
Kudos
Add Kudos
6
Bookmarks
Bookmark this Post
User avatar
ArunSharma12
Joined: 25 Oct 2015
Last visit: 20 Jul 2022
Posts: 513
Own Kudos:
Given Kudos: 74
Location: India
GMAT 1: 650 Q48 V31
GMAT 2: 720 Q49 V38 (Online)
GPA: 4
Products:
GMAT 2: 720 Q49 V38 (Online)
Posts: 513
Kudos: 1,019
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
Kinshook
User avatar
Major Poster
Joined: 03 Jun 2019
Last visit: 19 Nov 2025
Posts: 5,794
Own Kudos:
5,509
 [1]
Given Kudos: 161
Location: India
GMAT 1: 690 Q50 V34
WE:Engineering (Transportation)
Products:
GMAT 1: 690 Q50 V34
Posts: 5,794
Kudos: 5,509
 [1]
Kudos
Add Kudos
1
Bookmarks
Bookmark this Post
User avatar
Apt0810
Joined: 15 Jul 2018
Last visit: 24 Oct 2020
Posts: 327
Own Kudos:
622
 [1]
Given Kudos: 94
Posts: 327
Kudos: 622
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Statement supporting spokesperson (since he says that system is safe and biometrics is difficult to replicate by a hacker): A hacker cannot penetrate the security system by copying an employee's fingerprints and other biometric signatures

Statement supporting hacker (anything which was claimed to be impenetrable was compromised, it's just the availability of sufficient amount of time):Given enough time, the Security Firm's network will be accessed without authorization.

Posted from my mobile device
User avatar
yashikaaggarwal
User avatar
Senior Moderator - Masters Forum
Joined: 19 Jan 2020
Last visit: 17 Jul 2025
Posts: 3,086
Own Kudos:
3,102
 [1]
Given Kudos: 1,510
Location: India
GPA: 4
WE:Analyst (Internet and New Media)
Posts: 3,086
Kudos: 3,102
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Security Firm Spokesperson: Our computers requires multiple biometric signatures which can't be duplicated.

The spokes person claim is based upon the unique identification signatures (fingerprints/retinal scan etc.) which can't be copied at any cost when the signatures to be used is with multiple people at the same time.

The key element here is "BIO METRIC SYSTEM"

Hacker: it is only a matter of time before someone gains unauthorized access to the system.

Hacker claim that any account or computer system is accessible if the hacker is given enough time to forge through system.

The key element here is "TIME"

WE have to check which of the option states the above stated highlights as the focal point of the statement.

1) A hacker will eventually gain access by taking advantage of a human error in the management of the system. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

2) A hacker cannot penetrate the security system by copying an employee's fingerprints and other biometric signatures.(Biometric is the main highlight here, which was stated in spokesperson's claim) (so, it's spokesperson's strengthening point)

3) Every security system will eventually be comprised by a hacker. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

4) The multiple biometric signatures required to access the system make the system prohibitively expensive for most of the Security Firm's clients. (Biometric is present but the focal point of whole statement is cost not biometric) (Incorrect)

5) Given enough time, the Security Firm's network will be accessed without authorization.(Time is the main highlight here, which was stated in hacker's claim) (so, it's hacker's strengthening point)


6) The security software cannot be penetrated using any current method of hacking. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

So Spokesperson's Strengthening point is 2nd statement.
And Hacker's Strengthening Point is 5th statement.


Posted from my mobile device
User avatar
bumpbot
User avatar
Non-Human User
Joined: 09 Sep 2013
Last visit: 04 Jan 2021
Posts: 38,583
Own Kudos:
Posts: 38,583
Kudos: 1,079
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Hello from the GMAT Club BumpBot!

Thanks to another GMAT Club member, I have just discovered this valuable topic, yet it had no discussion for over a year. I am now bumping it up - doing my job. I think you may find it valuable (esp those replies with Kudos).

Want to see all other topics I dig out? Follow me (click follow button on profile). You will receive a summary of all topics I bump in your profile area as well as via email.
Moderators:
Math Expert
105379 posts
496 posts