0
0
Operating Systemsknowledge~20 mins

Access control matrix in Operating Systems - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Access Control Matrix Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding the structure of an access control matrix

Which of the following best describes the structure of an access control matrix in operating systems?

AA hierarchical tree showing the inheritance of permissions from parent to child objects.
BA list of all users and their passwords stored in a secure file.
CA table where rows represent subjects, columns represent objects, and each cell lists the access rights the subject has over the object.
DA log file recording all access attempts to system resources.
Attempts:
2 left
💡 Hint

Think about how permissions are organized between users and resources.

📋 Factual
intermediate
2:00remaining
Access control matrix size implications

What is a major practical limitation of implementing a full access control matrix in real operating systems?

AIt requires too much memory because the matrix can be very large with many subjects and objects.
BIt cannot represent different types of access rights.
CIt does not allow dynamic changes to permissions.
DIt only works for single-user systems.
Attempts:
2 left
💡 Hint

Consider what happens when there are many users and many resources.

🚀 Application
advanced
2:00remaining
Determining effective permissions from an access control matrix

Given the following access control matrix snippet:

       File1   File2   Printer
UserA   rw      r       -
UserB   r       rw      w
UserC   -       r       rw

What are the permissions UserB has on File2 and Printer?

ARead only on File2; no access on Printer
BNo access on File2; write only on Printer
CWrite only on File2; read and write on Printer
DRead and write on File2; write on Printer
Attempts:
2 left
💡 Hint

Look at the row for UserB and the columns for File2 and Printer.

🔍 Analysis
advanced
2:00remaining
Comparing access control matrix with ACL and capability list

Which statement correctly compares access control matrices with Access Control Lists (ACLs) and capability lists?

AAn access control matrix can be implemented by storing ACLs for each object or capability lists for each subject, but ACLs focus on objects and capability lists focus on subjects.
BACLs and capability lists are unrelated to access control matrices and serve different purposes.
CAccess control matrices are only theoretical and cannot be implemented using ACLs or capability lists.
DCapability lists store permissions per object, while ACLs store permissions per subject, opposite to the matrix.
Attempts:
2 left
💡 Hint

Think about how permissions can be organized by objects or by subjects.

Reasoning
expert
2:00remaining
Impact of dynamic changes in access control matrix

In a system using an access control matrix, what is the likely effect of frequently adding and removing subjects and objects on the matrix's management?

AIt reduces memory usage because unused rows and columns are automatically deleted.
BIt increases complexity and overhead because the matrix must be updated for every change, making real-time management difficult.
CIt has no effect since the matrix is static and does not change after system initialization.
DIt simplifies management because the matrix automatically adjusts without manual updates.
Attempts:
2 left
💡 Hint

Consider what happens when the number of users and resources changes often.