
Access Control Matrix and ACL
Authored by SHARDILLA (PBU)
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select best describes of Access Control Matrix (ACM)
A list of users attached to each subject showing their permissions
A conceptual model mapping subjects to objects with associated rights
A method to encrypt data in memory
A mechanism for authenticating users during login
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Access Control Matrix, the columns typically represent:
Users or processes
Objects such as files or devices
Types of access rights
Both users and objects together
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Suppose File1 has the following ACL: {Alice: R, Bob: RW, Admin: RWX}. Choose the CORRECT interpretation of the ACL statement above:
Alice can read and write, Bob can execute, Admin can only read
Alice can only read, Bob can read and write, Admin can do all operations
Alice has no permission, Bob has limited access, Admin has only write
All users have the same permissions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios is best handled by ACLs instead of an Access Control Matrix?
Quickly identifying all the resources accessible by a single user
Auditing user activity across the entire system
Checking who can access a specific file or device
Assigning default roles to a group of new users
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a student tries to modify exam results without being listed in the ACL of the database file, this is an example of:
Authorized access
Data redundancy
Unauthorized access
Access control delegation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement is most accurate about the relationship between ACM and ACL?
ACL is a practical implementation derived from the Access Control Matrix
ACM is created from multiple ACLs attached to each object
Both ACM and ACL are encryption methods
ACM is obsolete and replaced by ACL entirely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?