0
0
HLDsystem_design~20 mins

Authentication vs authorization in HLD - Practice Questions

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Authentication vs Authorization Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Difference between Authentication and Authorization

Which statement correctly describes the difference between authentication and authorization?

AAuthentication determines what you can do; authorization verifies who you are.
BAuthentication verifies who you are; authorization determines what you can do.
CAuthentication and authorization both verify user identity.
DAuthorization is done before authentication in a secure system.
Attempts:
2 left
💡 Hint

Think about logging in versus accessing resources.

Architecture
intermediate
2:00remaining
Component responsible for Authorization in a Web System

In a typical web application architecture, which component is primarily responsible for authorization decisions?

AAuthentication server
BUser interface
CResource server or API gateway
DDatabase server
Attempts:
2 left
💡 Hint

Authorization controls access to resources after identity is confirmed.

scaling
advanced
2:00remaining
Scaling Authentication in a Large Distributed System

Which approach best supports scaling authentication in a large distributed system with many users?

ADistributed authentication with stateless tokens like JWTs validated locally
BStoring user credentials on each client device for offline authentication
CCentralized authentication server handling all requests synchronously
DUsing a single database for all user credentials without caching
Attempts:
2 left
💡 Hint

Consider reducing bottlenecks and network calls.

tradeoff
advanced
2:00remaining
Tradeoff Between Authentication Strength and User Experience

What is a common tradeoff when increasing authentication strength in a system?

AAuthentication strength does not affect system performance or user experience
BStronger authentication always improves user experience without drawbacks
CWeaker authentication improves security but reduces user convenience
DStronger authentication can reduce user convenience but improves security
Attempts:
2 left
💡 Hint

Think about multi-factor authentication and user effort.

estimation
expert
2:00remaining
Estimating Load on Authorization Service

A system has 1 million active users. Each user makes 10 resource requests per minute. If each request requires an authorization check, estimate the number of authorization checks per second the system must handle.

AApproximately 166,667 authorization checks per second
BApproximately 10,000 authorization checks per second
CApproximately 600,000 authorization checks per second
DApproximately 1,000,000 authorization checks per second
Attempts:
2 left
💡 Hint

Calculate total requests per minute, then convert to per second.