MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security User Authentication knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What forces the user to change password at first login? |
| A. | Default behavior of OS |
| B. | Part of AES encryption practice |
| C. | Devices being accessed forces the user |
| D. | Account administrator |
| Answer» E. | |
| 2. |
What are the characteristics of Authorization? |
| A. | RADIUS and RSA |
| B. | 3 way handshaking with syn and fin |
| C. | Multilayered protection for securing resources |
| D. | Deals with privileges and rights |
| Answer» E. | |
| 3. |
Which happens first authorization or authentication? |
| A. | Authorization |
| B. | Authentication |
| C. | Authorization & Authentication are same |
| D. | None of the mentioned |
| Answer» B. Authentication | |
| 4. |
What is characteristic of RADIUS system? |
| A. | It is essential for centralized encryption and authentication |
| B. | It works on Network layer to deny access to unauthorized people |
| C. | It provides centralized authentication mechanism via network devices |
| D. | It s a strong File access system |
| Answer» D. It s a strong File access system | |
| 5. |
What does Light Directory Access Protocol (LDAP) doesn t store? |
| A. | Users |
| B. | Address |
| C. | Passwords |
| D. | Security Keys |
| Answer» C. Passwords | |
| 6. |
Why is one time password safe? |
| A. | It is easy to generated |
| B. | It cannot be shared |
| C. | It is different for every access |
| D. | It is a complex encrypted password |
| Answer» D. It is a complex encrypted password | |
| 7. |
Which of the following is a strong password? |
| A. | 19thAugust88 |
| B. | Delhi88 |
| C. | P@assw0rd |
| D. | !augustdelhi |
| Answer» D. !augustdelhi | |
| 8. |
Which of the following is the least secure method of authentication? |
| A. | Key card |
| B. | fingerprint |
| C. | retina pattern |
| D. | Password |
| Answer» E. | |
| 9. |
What is not a good practice for user administration? |
| A. | Isolating a system after a compromise |
| B. | Perform random auditing procedures |
| C. | Granting privileges on a per host basis |
| D. | Using telnet and FTP for remote access |
| Answer» E. | |
| 10. |
Which of the following is a good practice? |
| A. | Give full permission for remote transferring |
| B. | Grant read only permission |
| C. | Grant limited permission to specified account |
| D. | Give both read and write permission but not execute |
| Answer» D. Give both read and write permission but not execute | |
| 11. |
What are the common security threats? |
| A. | File Shredding |
| B. | File sharing and permission |
| C. | File corrupting |
| D. | File integrity |
| Answer» C. File corrupting | |