Search Header Logo

Access Control Matrix and ACL

Authored by SHARDILLA (PBU)

Computers

University

Access Control Matrix and ACL
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select best describes of Access Control Matrix (ACM)

A list of users attached to each subject showing their permissions

A conceptual model mapping subjects to objects with associated rights

A method to encrypt data in memory

A mechanism for authenticating users during login

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Access Control Matrix, the columns typically represent:

Users or processes

Objects such as files or devices

Types of access rights

Both users and objects together

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Suppose File1 has the following ACL: {Alice: R, Bob: RW, Admin: RWX}. Choose the CORRECT interpretation of the ACL statement above:

Alice can read and write, Bob can execute, Admin can only read

Alice can only read, Bob can read and write, Admin can do all operations

Alice has no permission, Bob has limited access, Admin has only write

All users have the same permissions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios is best handled by ACLs instead of an Access Control Matrix?

Quickly identifying all the resources accessible by a single user

Auditing user activity across the entire system

Checking who can access a specific file or device

Assigning default roles to a group of new users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a student tries to modify exam results without being listed in the ACL of the database file, this is an example of:

Authorized access

Data redundancy

Unauthorized access

Access control delegation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is most accurate about the relationship between ACM and ACL?

ACL is a practical implementation derived from the Access Control Matrix

ACM is created from multiple ACLs attached to each object

Both ACM and ACL are encryption methods

ACM is obsolete and replaced by ACL entirely

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?