Access Control Matrix: Model & Example


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which option below contains the two access controls used to regulate access to information?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which option contains the complete series of access attributes used to indicate actions that may be taken by an individual having access to a file?

2. Which option below correctly lists the security principles used when setting up an access control?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

There are many uses for access control protocols, as they can control access to privileged information in several different ways. This quiz/worksheet combo will assess your knowledge of access control matrices, including the different ways they work.

Quiz & Worksheet Goals

This quiz and worksheet cover the following:

  • Two access controls to regulate access to information
  • The series of access attributes an individual may have for a file
  • What security principles can be used when setting up access control
  • An access control method determined by an individual's work type
  • Defining an access control matrix

Skills Practiced

These assessments use the following skills:

  • Information recall - access the knowledge you've gained regarding how to restrict access to privileged information
  • Reading comprehension - ensure that you draw the most important information from the related lesson on different methods of organizing access to documents and files
  • Knowledge application - use your knowledge to check your understanding of security principles involved in regulating access to information

Additional Learning

Enrich your knowledge of regulating access to information by reviewing the lesson titled Access Control Matrix: Model & Example. This lesson covers the following:

  • What the mandatory access control model entails
  • Why a person may want to restrict access to certain information
  • A text example of an access control matrix