0
0
HLDsystem_design~10 mins

Authentication vs authorization in HLD - Interactive Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the process that verifies user identity.

HLD
The process of verifying who a user is called [1].
Drag options to blanks, or click blank then click option'
AAuthorization
BEncryption
CAuthentication
DAuditing
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing authentication with authorization.
Thinking encryption is the same as authentication.
2fill in blank
medium

Complete the code to identify the process that controls user access rights.

HLD
The process that determines what a user can do is called [1].
Drag options to blanks, or click blank then click option'
AAuthorization
BAuthentication
CValidation
DEncryption
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up authorization with authentication.
Assuming validation is the same as authorization.
3fill in blank
hard

Fix the error in the statement about authentication and authorization.

HLD
Authentication is about [1] access rights to resources.
Drag options to blanks, or click blank then click option'
Aencrypting
Bgranting
Ccontrolling
Dverifying
Attempts:
3 left
💡 Hint
Common Mistakes
Saying authentication controls access rights.
Confusing verifying with granting permissions.
4fill in blank
hard

Fill both blanks to complete the sentence about authentication and authorization.

HLD
After [1], the system performs [2] to check user permissions.
Drag options to blanks, or click blank then click option'
Aauthentication
Bauthorization
Cvalidation
Dencryption
Attempts:
3 left
💡 Hint
Common Mistakes
Reversing the order of authentication and authorization.
Using validation or encryption instead of authorization.
5fill in blank
hard

Fill all three blanks to complete the explanation of authentication and authorization.

HLD
In a secure system, [1] confirms identity, [2] checks permissions, and [3] protects data.
Drag options to blanks, or click blank then click option'
Aauthentication
Bauthorization
Cencryption
Dvalidation
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up authorization and encryption.
Leaving out encryption as a protection step.