0
0
Operating Systemsknowledge~10 mins

User authentication mechanisms in Operating Systems - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the common factor used in password authentication.

Operating Systems
Authentication often requires a [1] that only the user knows.
Drag options to blanks, or click blank then click option'
Apassword
Busername
Cemail
DIP address
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing username with password.
Thinking email is used for authentication instead of identification.
2fill in blank
medium

Complete the code to specify a type of authentication that uses physical characteristics.

Operating Systems
Biometric authentication uses [1] like fingerprints or facial recognition.
Drag options to blanks, or click blank then click option'
Abiometrics
Btokens
Cpasswords
DPINs
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing passwords or PINs which are knowledge-based, not physical.
Confusing tokens with biometrics.
3fill in blank
hard

Fix the error in the statement about multi-factor authentication.

Operating Systems
Multi-factor authentication requires [1] types of credentials from different categories.
Drag options to blanks, or click blank then click option'
Aone
Btwo
Cthree
Dfour
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking only one factor is enough.
Assuming three or more factors are always required.
4fill in blank
hard

Fill both blanks to complete the description of a common authentication protocol.

Operating Systems
The [1] protocol uses a [2] to verify user identity over a network.
Drag options to blanks, or click blank then click option'
AKerberos
Bpassword
COAuth
Dtoken
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing OAuth with Kerberos.
Using password instead of token for network verification.
5fill in blank
hard

Fill all three blanks to complete the explanation of authentication factors.

Operating Systems
Authentication factors include [1] (something you know), [2] (something you have), and [3] (something you are).
Drag options to blanks, or click blank then click option'
Aknowledge
Bpossession
Cinherence
Dlocation
Attempts:
3 left
💡 Hint
Common Mistakes
Including location as a main factor.
Mixing up possession and inherence.