Access Control Matrix and ACL

Access Control Matrix and ACL

University

6 Qs

quiz-placeholder

Similar activities

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

Introduction to Database

Introduction to Database

University

10 Qs

Managing User Accounts

Managing User Accounts

9th Grade - University

10 Qs

Quiz No. 4 - Finals

Quiz No. 4 - Finals

University

10 Qs

J277 - 1.4 - Controlling Network Access

J277 - 1.4 - Controlling Network Access

10th Grade - University

10 Qs

FOS Ch 2: Part 1 (Quiz 5)

FOS Ch 2: Part 1 (Quiz 5)

University

10 Qs

Network Quiz

Network Quiz

University

10 Qs

Firewall Test

Firewall Test

University

10 Qs

Access Control Matrix and ACL

Access Control Matrix and ACL

Assessment

Quiz

Computers

University

Hard

Created by

SHARDILLA (PBU)

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select best describes of Access Control Matrix (ACM)

A list of users attached to each subject showing their permissions

A conceptual model mapping subjects to objects with associated rights

A method to encrypt data in memory

A mechanism for authenticating users during login

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Access Control Matrix, the columns typically represent:

Users or processes

Objects such as files or devices

Types of access rights

Both users and objects together

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Suppose File1 has the following ACL: {Alice: R, Bob: RW, Admin: RWX}. Choose the CORRECT interpretation of the ACL statement above:

Alice can read and write, Bob can execute, Admin can only read

Alice can only read, Bob can read and write, Admin can do all operations

Alice has no permission, Bob has limited access, Admin has only write

All users have the same permissions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios is best handled by ACLs instead of an Access Control Matrix?

Quickly identifying all the resources accessible by a single user

Auditing user activity across the entire system

Checking who can access a specific file or device

Assigning default roles to a group of new users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a student tries to modify exam results without being listed in the ACL of the database file, this is an example of:

Authorized access

Data redundancy

Unauthorized access

Access control delegation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is most accurate about the relationship between ACM and ACL?

ACL is a practical implementation derived from the Access Control Matrix

ACM is created from multiple ACLs attached to each object

Both ACM and ACL are encryption methods

ACM is obsolete and replaced by ACL entirely