System Administrator 2026
What are the characteristics of Authorization?
  • A. Radius and rsa
  • B. 3 way handshaking with syn and fin
  • C. Multilayered protection for securing resources
  • D. Deals with privileges and rights
What forces the user to change password at first login?
  • A. Default behavior of os
  • B. Part of aes encryption practice
  • C. Devices being accessed forces the user
  • D. Account administrator
What is not a best practice for password policy?
  • A. Deciding maximum age of password
  • B. Restriction on password reuse and history
  • C. Password encryption
  • D. Having change password every 2 years
What is the breach of integrity?
  • A. This type of violation involves unauthorized reading of data
  • B. This violation involves unauthorized modification of data
  • C. This violation involves unauthorized destruction of data
  • D. This violation involves unauthorized use of resources
What is breach of confidentiality?
  • A. This type of violation involves unauthorized reading of data
  • B. This violation involves unauthorized modification of data
  • C. This violation involves unauthorized destruction of data
  • D. This violation involves unauthorized use of resources
What is theft of service?
  • A. This type of violation involves unauthorized reading of data
  • B. This violation involves unauthorized modification of data
  • C. This violation involves unauthorized destruction of data
  • D. This violation involves unauthorized use of resources
What is breach of availability?
  • A. This type of violation involves unauthorized reading of data
  • B. This violation involves unauthorized modification of data
  • C. This violation involves unauthorized destruction of data
  • D. This violation involves unauthorized use of resources
What is Trojan horse?
  • A. It is a useful way to encrypt password
  • B. It is a user which steals valuable information
  • C. It is a rogue program which tricks users
  • D. It’s a brute force attack algorithm
What is trap door?
  • A. It is trap door in wargames
  • B. It is a hole in software left by designer
  • C. It is a trojan horse
  • D. It is a virus which traps and locks user terminal
Which mechanism is used by worm process?
  • A. Trap door
  • B. Fake process
  • C. Spawn process
  • D. Vax process