
Access Control Matrix and ACL
Authored by SHARDILLA (PBU)
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select best describes of Access Control Matrix (ACM)
A list of users attached to each subject showing their permissions
A conceptual model mapping subjects to objects with associated rights
A method to encrypt data in memory
A mechanism for authenticating users during login
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Access Control Matrix, the columns typically represent:
Users or processes
Objects such as files or devices
Types of access rights
Both users and objects together
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Suppose File1 has the following ACL: {Alice: R, Bob: RW, Admin: RWX}. Choose the CORRECT interpretation of the ACL statement above:
Alice can read and write, Bob can execute, Admin can only read
Alice can only read, Bob can read and write, Admin can do all operations
Alice has no permission, Bob has limited access, Admin has only write
All users have the same permissions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios is best handled by ACLs instead of an Access Control Matrix?
Quickly identifying all the resources accessible by a single user
Auditing user activity across the entire system
Checking who can access a specific file or device
Assigning default roles to a group of new users
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a student tries to modify exam results without being listed in the ACL of the database file, this is an example of:
Authorized access
Data redundancy
Unauthorized access
Access control delegation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is most accurate about the relationship between ACM and ACL?
ACL is a practical implementation derived from the Access Control Matrix
ACM is created from multiple ACLs attached to each object
Both ACM and ACL are encryption methods
ACM is obsolete and replaced by ACL entirely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
ITE-1-Ch01-Quiz1
Quiz
•
University
10 questions
C++ Array Quiz
Quiz
•
University
10 questions
DBMS Lab Quiz 1 2B3
Quiz
•
University
10 questions
P1_APLab2Quiz_B3B4
Quiz
•
University
10 questions
KNOWLEDGE QUIZ (How IT savvy are you?
Quiz
•
University
10 questions
Firewall Basic
Quiz
•
University
10 questions
KOMPAK KD.3.1 - UH KE-1 SEMSETER GANJIL
Quiz
•
University
10 questions
Pengenalan Tampilan MS Word
Quiz
•
12th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
20 questions
Place Value
Quiz
•
KG - 3rd Grade
12 questions
CKLA Unit 6 Comprehension Assessment K
Quiz
•
KG
23 questions
CKLA Unit 6 Assessment K
Quiz
•
KG
16 questions
Blends and Digraphs
Quiz
•
KG - 1st Grade
10 questions
Direct and Indirect Characterization
Quiz
•
KG
22 questions
Waves
Quiz
•
KG - University
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...