Operating system mcqs security user authentication
Click on any option to know the CORRECT ANSWERS
Which of the following are forms of malicious attack?
Theft of information
Modification of data
Wiping of information
All of the mentioned
What are the common security threats?
File sharing and permission
Question 2 Explanation:
Sharing and associated permissions are usual exploits which can compromise the system.
What are the characteristics of Authorization?
RADIUS and RSA
3 way handshaking with syn and fin
Multilayered protection for securing resources
Deals with privileges and rights
Which happens first authorization or authentication?
Authorization & Authentication are same
None of the mentioned
What is characteristic of RADIUS system?
It is essential for centralized encryption and authentication
It works on Network layer to deny access to unauthorized people
It provides centralized authentication mechanism via network devices
It's a strong File access system
There are 5 questions to complete.