ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>
ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>
Operating system mcqs security user authentication


Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
Which of the following are forms of malicious attack?
Theft of information | |
Modification of data | |
Wiping of information | |
All of the mentioned |
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the common security threats?
File Shredding | |
File sharing and permission | |
File corrupting | |
File integrity |
Question 2 Explanation:
Sharing and associated permissions are usual exploits which can compromise the system.
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the characteristics of Authorization?
RADIUS and RSA | |
3 way handshaking with syn and fin | |
Multilayered protection for securing resources | |
Deals with privileges and rights |
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
Which happens first authorization or authentication?
Authorization | |
Authentication | |
Authorization & Authentication are same | |
None of the mentioned |
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What is characteristic of RADIUS system?
It is essential for centralized encryption and authentication | |
It works on Network layer to deny access to unauthorized people | |
It provides centralized authentication mechanism via network devices | |
It's a strong File access system |
There are 5 questions to complete.