Which term describes the table that maps subjects to their rights over objects?

Prepare for the Certified Identity and Access Manager Exam using flashcards and multiple-choice questions. Gain insights into the exam format, practice with real-world scenarios, and ensure your success in becoming a certified professional.

Multiple Choice

Which term describes the table that maps subjects to their rights over objects?

Explanation:
An access control matrix is the formal table that records which subjects (such as users or processes) have which permissions on which objects (like files, databases, or devices). In this two-dimensional layout, each row represents a subject and each column represents an object, and the cell lists the rights the subject has for that object (for example, read, write, execute, delete). This structure gives a complete view of who can do what with which resources, and it underpins practical implementations like access control lists on objects and capability lists on subjects. For instance, you might see that a user has read and write access to a particular file, while another user has only read access. Data Confidentiality and Confidentiality describe security goals about preventing unauthorized access, and Integrity refers to ensuring data accuracy and trustworthiness. They are not the table that maps permissions, which is why they don’t fit as the correct term.

An access control matrix is the formal table that records which subjects (such as users or processes) have which permissions on which objects (like files, databases, or devices). In this two-dimensional layout, each row represents a subject and each column represents an object, and the cell lists the rights the subject has for that object (for example, read, write, execute, delete). This structure gives a complete view of who can do what with which resources, and it underpins practical implementations like access control lists on objects and capability lists on subjects. For instance, you might see that a user has read and write access to a particular file, while another user has only read access.

Data Confidentiality and Confidentiality describe security goals about preventing unauthorized access, and Integrity refers to ensuring data accuracy and trustworthiness. They are not the table that maps permissions, which is why they don’t fit as the correct term.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy