Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 161 Computer Security Fall 2005 Joseph/Tygar/Vazirani/Wagner MT 1 P RINT your name: , (last) (first) S IGN your name: P RINT your Unix account name: P RINT your TA’s name: You may consult any books, notes, or other paper-based inanimate objects available to you. Calculators and computers are not permitted. Please write your answers in the spaces provided in the test; in particular, we will not grade anything on the back of an exam page unless we are clearly told on the front of the page to look there. Please be concise. If you have questions, make a best guess and state your assumptions. You have 50 minutes. There are 4 questions, of varying credit (100 points total). The questions are of varying difficulty, so avoid spending too long on any one question. Do not turn this page until your proctor tells you to do so. Problem 1 Problem 2 Problem 3 Problem 4 Total CS 161, Fall 2005, MT 1 1 Problem 1. [Short answer] (30 points) Give brief answers (one or two sentences) to each of the following. (a) What is the principle of least privilege? Why is it important?...
View Full Document

This homework help was uploaded on 01/29/2008 for the course CS 194 taught by Professor Joseph during the Fall '05 term at University of California, Berkeley.

Page1 / 5

Midterm 1-Fall05 - CS 161 Computer Security Fall 2005 Joseph/Tygar/Vazirani/Wagner MT 1 P RINT your name(last(first S IGN your name P RINT your

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online