MCQOPTIONS
 Saved Bookmarks
				This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security User Authentication knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What forces the user to change password at first login? | 
                            
| A. | Default behavior of OS | 
| B. | Part of AES encryption practice | 
| C. | Devices being accessed forces the user | 
| D. | Account administrator | 
| Answer» E. | |
| 2. | 
                                    What are the characteristics of Authorization? | 
                            
| A. | RADIUS and RSA | 
| B. | 3 way handshaking with syn and fin | 
| C. | Multilayered protection for securing resources | 
| D. | Deals with privileges and rights | 
| Answer» E. | |
| 3. | 
                                    Which happens first authorization or authentication? | 
                            
| A. | Authorization | 
| B. | Authentication | 
| C. | Authorization & Authentication are same | 
| D. | None of the mentioned | 
| Answer» B. Authentication | |
| 4. | 
                                    What is characteristic of RADIUS system? | 
                            
| A. | It is essential for centralized encryption and authentication | 
| B. | It works on Network layer to deny access to unauthorized people | 
| C. | It provides centralized authentication mechanism via network devices | 
| D. | It s a strong File access system | 
| Answer» D. It s a strong File access system | |
| 5. | 
                                    What does Light Directory Access Protocol (LDAP) doesn t store? | 
                            
| A. | Users | 
| B. | Address | 
| C. | Passwords | 
| D. | Security Keys | 
| Answer» C. Passwords | |
| 6. | 
                                    Why is one time password safe? | 
                            
| A. | It is easy to generated | 
| B. | It cannot be shared | 
| C. | It is different for every access | 
| D. | It is a complex encrypted password | 
| Answer» D. It is a complex encrypted password | |
| 7. | 
                                    Which of the following is a strong password? | 
                            
| A. | 19thAugust88 | 
| B. | Delhi88 | 
| C. | P@assw0rd | 
| D. | !augustdelhi | 
| Answer» D. !augustdelhi | |
| 8. | 
                                    Which of the following is the least secure method of authentication? | 
                            
| A. | Key card | 
| B. | fingerprint | 
| C. | retina pattern | 
| D. | Password | 
| Answer» E. | |
| 9. | 
                                    What is not a good practice for user administration? | 
                            
| A. | Isolating a system after a compromise | 
| B. | Perform random auditing procedures | 
| C. | Granting privileges on a per host basis | 
| D. | Using telnet and FTP for remote access | 
| Answer» E. | |
| 10. | 
                                    Which of the following is a good practice? | 
                            
| A. | Give full permission for remote transferring | 
| B. | Grant read only permission | 
| C. | Grant limited permission to specified account | 
| D. | Give both read and write permission but not execute | 
| Answer» D. Give both read and write permission but not execute | |
| 11. | 
                                    What are the common security threats? | 
                            
| A. | File Shredding | 
| B. | File sharing and permission | 
| C. | File corrupting | 
| D. | File integrity | 
| Answer» C. File corrupting | |