
Access Control Matrix and ACL
Authored by SHARDILLA (PBU)
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select best describes of Access Control Matrix (ACM)
A list of users attached to each subject showing their permissions
A conceptual model mapping subjects to objects with associated rights
A method to encrypt data in memory
A mechanism for authenticating users during login
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Access Control Matrix, the columns typically represent:
Users or processes
Objects such as files or devices
Types of access rights
Both users and objects together
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Suppose File1 has the following ACL: {Alice: R, Bob: RW, Admin: RWX}. Choose the CORRECT interpretation of the ACL statement above:
Alice can read and write, Bob can execute, Admin can only read
Alice can only read, Bob can read and write, Admin can do all operations
Alice has no permission, Bob has limited access, Admin has only write
All users have the same permissions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios is best handled by ACLs instead of an Access Control Matrix?
Quickly identifying all the resources accessible by a single user
Auditing user activity across the entire system
Checking who can access a specific file or device
Assigning default roles to a group of new users
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a student tries to modify exam results without being listed in the ACL of the database file, this is an example of:
Authorized access
Data redundancy
Unauthorized access
Access control delegation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is most accurate about the relationship between ACM and ACL?
ACL is a practical implementation derived from the Access Control Matrix
ACM is created from multiple ACLs attached to each object
Both ACM and ACL are encryption methods
ACM is obsolete and replaced by ACL entirely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Mobile Computing P10
Quiz
•
University
10 questions
Operating System and Computer Architecture Quiz
Quiz
•
University
10 questions
Enterprise Computing_Quiz2Series
Quiz
•
12th Grade - University
10 questions
Augmented Reality
Quiz
•
University
10 questions
R Quiz
Quiz
•
University
10 questions
Cloud Computing Quiz
Quiz
•
University
10 questions
Recap - Macs & PCs
Quiz
•
University
10 questions
Tableau
Quiz
•
University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
11 questions
FOREST Growth Mindset
Lesson
•
KG
10 questions
THEME
Quiz
•
KG - University
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
10 questions
Long i- igh, ie, and y Quiz
Quiz
•
KG - 3rd Grade
10 questions
2D & 3D Shapes
Quiz
•
KG
20 questions
Capitalization in sentences
Quiz
•
KG - 4th Grade