Question 1: OS - Authentication
Which of the following best describes authentication in operating systems?
Question 2: OS - Authorization
After successful authentication, the next step in system security is authorization. What does it determine?
Question 3: OS - Access Control Models
Which access control model allows users to control permissions on their own files?
Question 4: OS - Role-Based Access Control (RBAC)
What is the primary advantage of Role-Based Access Control (RBAC)?
Question 5: OS - Malware Types
Which of the following correctly matches malware with its primary characteristic?
Question 6: OS - Malware Protection
Which method is most effective for preventing zero-day malware attacks?
Question 7: OS - Password Security
Which of the following practices strengthens password-based authentication?
Question 8: OS - Two-Factor Authentication (2FA)
What are the two categories of factors typically combined in two-factor authentication (2FA)?
Question 9: OS - Principle of Least Privilege
The Principle of Least Privilege (PoLP) in system protection states that:
Question 10: OS - Security vs Protection
Which statement best describes the difference between security and protection in operating systems?