This document lists common biometric techniques including fingerprint recognition, signature dynamics, iris scanning, retina scanning, voice prints, and face recognition. It asks the reader to select one of these techniques and discuss the benefits and vulnerabilities of that specific method in 6-7 paragraphs.