Explain how access control lists might be implemented.
What will be an ideal response?
A capability table specifies the subjects and objects that users or groups can access; in some systems, capability tables are called user profiles or user policies. These specifications frequently take the form of complex matrices, rather than simple lists or tables. The access control matrix combines capability tables and ACLs, so that organizational assets are listed along the vertical axis while users are listed along the horizontal axis. The resulting matrix contains ACLs in columns for a particular device or asset, while a row contains the capability table for a particular user.
You might also like to view...
Which of the following is the main storage device in most desktop computers?
A. a hard disk drive B. magnetic tape C. flash drive D. DVD
What are the relative advantages and disadvantages of SSDs and HDDs?
What will be an ideal response?
Explain the no charge method.
What will be an ideal response?
A Paper fill and a None fill are essentially the same thing.
Answer the following statement true (T) or false (F)