Security and Protection – Authentication, authorization, access control, malware protection

    Question 1OS - Authentication

    Which of the following best describes authentication in operating systems?

    Question 2OS - Authorization

    After successful authentication, the next step in system security is authorization. What does it determine?

    Question 3OS - Access Control Models

    Which access control model allows users to control permissions on their own files?

    Question 4OS - Role-Based Access Control (RBAC)

    What is the primary advantage of Role-Based Access Control (RBAC)?

    Question 5OS - Malware Types

    Which of the following correctly matches malware with its primary characteristic?

    Question 6OS - Malware Protection

    Which method is most effective for preventing zero-day malware attacks?

    Question 7OS - Password Security

    Which of the following practices strengthens password-based authentication?

    Question 8OS - Two-Factor Authentication (2FA)

    What are the two categories of factors typically combined in two-factor authentication (2FA)?

    Question 9OS - Principle of Least Privilege

    The Principle of Least Privilege (PoLP) in system protection states that:

    Question 10OS - Security vs Protection

    Which statement best describes the difference between security and protection in operating systems?