Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 161 Computer Security Fall 2005 Joseph/Tygar/Vazirani/Wagner MT 1 P RINT your name: , (last) (first) S IGN your name: P RINT your Unix account name: P RINT your TAs name: You may consult any books, notes, or other paper-based inanimate objects available to you. Calculators and computers are not permitted. Please write your answers in the spaces provided in the test; in particular, we will not grade anything on the back of an exam page unless we are clearly told on the front of the page to look there. Please be concise. If you have questions, make a best guess and state your assumptions. You have 50 minutes. There are 4 questions, of varying credit (100 points total). The questions are of varying difficulty, so avoid spending too long on any one question. Do not turn this page until your proctor tells you to do so. Problem 1 Problem 2 Problem 3 Problem 4 Total CS 161, Fall 2005, MT 1 1 Problem 1. [Firewalls and Network Threats] (30 points) List and explain three network threats that a firewall does not protect against. (If a threat only applies tothree network threats that a firewall does not protect against....
View Full Document

This homework help was uploaded on 01/29/2008 for the course CS 194 taught by Professor Joseph during the Fall '05 term at University of California, Berkeley.

Page1 / 5

midterm 2-Fall05 - CS 161 Computer Security Fall 2005

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online