Last visit was: 25 Apr 2026, 18:33 It is currently 25 Apr 2026, 18:33
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
jefferyk
Joined: 15 Jul 2020
Last visit: 18 Sep 2020
Posts: 22
Own Kudos:
127
 [9]
Given Kudos: 55
Posts: 22
Kudos: 127
 [9]
2
Kudos
Add Kudos
7
Bookmarks
Bookmark this Post
User avatar
ArunSharma12
Joined: 25 Oct 2015
Last visit: 20 Jul 2022
Posts: 512
Own Kudos:
Given Kudos: 74
Location: India
GMAT 1: 650 Q48 V31
GMAT 2: 720 Q49 V38 (Online)
GPA: 4
Products:
GMAT 2: 720 Q49 V38 (Online)
Posts: 512
Kudos: 1,037
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
Kinshook
User avatar
Major Poster
Joined: 03 Jun 2019
Last visit: 25 Apr 2026
Posts: 5,986
Own Kudos:
5,859
 [1]
Given Kudos: 163
Location: India
GMAT 1: 690 Q50 V34
WE:Engineering (Transportation)
Products:
GMAT 1: 690 Q50 V34
Posts: 5,986
Kudos: 5,859
 [1]
Kudos
Add Kudos
1
Bookmarks
Bookmark this Post
User avatar
Apt0810
Joined: 15 Jul 2018
Last visit: 24 Oct 2020
Posts: 323
Own Kudos:
667
 [1]
Given Kudos: 94
Posts: 323
Kudos: 667
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Statement supporting spokesperson (since he says that system is safe and biometrics is difficult to replicate by a hacker): A hacker cannot penetrate the security system by copying an employee's fingerprints and other biometric signatures

Statement supporting hacker (anything which was claimed to be impenetrable was compromised, it's just the availability of sufficient amount of time):Given enough time, the Security Firm's network will be accessed without authorization.

Posted from my mobile device
User avatar
yashikaaggarwal
User avatar
Senior Moderator - Masters Forum
Joined: 19 Jan 2020
Last visit: 29 Mar 2026
Posts: 3,089
Own Kudos:
3,158
 [1]
Given Kudos: 1,510
Location: India
GPA: 4
WE:Analyst (Internet and New Media)
Posts: 3,089
Kudos: 3,158
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Security Firm Spokesperson: Our computers requires multiple biometric signatures which can't be duplicated.

The spokes person claim is based upon the unique identification signatures (fingerprints/retinal scan etc.) which can't be copied at any cost when the signatures to be used is with multiple people at the same time.

The key element here is "BIO METRIC SYSTEM"

Hacker: it is only a matter of time before someone gains unauthorized access to the system.

Hacker claim that any account or computer system is accessible if the hacker is given enough time to forge through system.

The key element here is "TIME"

WE have to check which of the option states the above stated highlights as the focal point of the statement.

1) A hacker will eventually gain access by taking advantage of a human error in the management of the system. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

2) A hacker cannot penetrate the security system by copying an employee's fingerprints and other biometric signatures.(Biometric is the main highlight here, which was stated in spokesperson's claim) (so, it's spokesperson's strengthening point)

3) Every security system will eventually be comprised by a hacker. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

4) The multiple biometric signatures required to access the system make the system prohibitively expensive for most of the Security Firm's clients. (Biometric is present but the focal point of whole statement is cost not biometric) (Incorrect)

5) Given enough time, the Security Firm's network will be accessed without authorization.(Time is the main highlight here, which was stated in hacker's claim) (so, it's hacker's strengthening point)


6) The security software cannot be penetrated using any current method of hacking. (Neither Time nor biometric is present in the statement, can't be used as the strengthening point for any of the spokesperson or hacker) (Incorrect)

So Spokesperson's Strengthening point is 2nd statement.
And Hacker's Strengthening Point is 5th statement.


Posted from my mobile device
User avatar
bumpbot
User avatar
Non-Human User
Joined: 09 Sep 2013
Last visit: 04 Jan 2021
Posts: 38,986
Own Kudos:
Posts: 38,986
Kudos: 1,118
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Automated notice from GMAT Club BumpBot:

A member just gave Kudos to this thread, showing it’s still useful. I’ve bumped it to the top so more people can benefit. Feel free to add your own questions or solutions.

This post was generated automatically.
Moderators:
Math Expert
109830 posts
498 posts
212 posts