Watch this video on YouTube
Which type of attack exploits residual biometric characteristics to gain unauthorized access?