0
0
Operating Systemsknowledge~20 mins

User authentication mechanisms in Operating Systems - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
πŸŽ–οΈ
User Authentication Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
What is the primary purpose of multi-factor authentication (MFA)?

Multi-factor authentication (MFA) is a security method used in user authentication. What is its main goal?

ATo store user passwords in an encrypted file on the server
BTo allow users to log in without a password by using only a fingerprint
CTo require users to provide two or more different types of evidence to verify their identity
DTo limit the number of login attempts before locking the account
Attempts:
2 left
πŸ’‘ Hint

Think about how MFA increases security beyond just a password.

πŸ“‹ Factual
intermediate
2:00remaining
Which authentication method uses a secret shared between the user and the system?

Among common authentication methods, which one relies on a secret known only to the user and the system?

AToken-based authentication
BPassword-based authentication
CBiometric authentication
DCertificate-based authentication
Attempts:
2 left
πŸ’‘ Hint

Consider which method requires memorizing a secret string.

πŸ” Analysis
advanced
2:00remaining
What error will occur if a system tries to authenticate a user with a missing biometric template?

Consider a system that uses fingerprint data stored as a biometric template. What happens if the template is missing when the user tries to authenticate?

AAuthentication fails due to missing data, resulting in an error or denial
BThe system automatically falls back to password authentication without error
CThe system grants access because no template means no check is needed
DThe system crashes with a runtime exception
Attempts:
2 left
πŸ’‘ Hint

Think about what happens if required data for verification is not available.

❓ Comparison
advanced
2:00remaining
Which authentication mechanism provides the strongest protection against password theft?

Compare these authentication methods and select the one that best protects against password theft.

AMulti-factor authentication using password and hardware token
BSingle-factor password authentication
CPassword authentication with periodic forced resets
DPassword stored in hashed form on the server
Attempts:
2 left
πŸ’‘ Hint

Consider which method adds an extra layer beyond just the password.

❓ Reasoning
expert
3:00remaining
Why is storing passwords using salted hashes more secure than storing plain hashes?

Explain why adding a salt to password hashes improves security compared to storing just the hash of the password.

ASalting encrypts the password making it unreadable to the system
BSalting speeds up the authentication process by caching hashes
CSalting allows passwords to be stored in plain text safely
DSalting prevents attackers from using precomputed tables to reverse hashes easily
Attempts:
2 left
πŸ’‘ Hint

Think about how attackers try to guess passwords using common hash lists.