This preview shows page 1. Sign up to view the full content.
Unformatted text preview: + n n 2) D o t h e f o l l o w i n g [25 Points] i) Describe and differentiate between the mechanisms related to: Setuid program in Unix and Impersonation in Windows ii) Note that the following two resolution rules are used in Windows. Explain how given a security descriptor and an access token , these resolution techniques are used. (1) Positive permissions are additive (2) Negative permission (deny access) takes priority iii) Assume that when a file is created and before the umask value has been applied, the permission bits are 0626 (in class we assumed 0777). What will be the permission setting for the new files when the following umask values are applied (1) 032 (2) 031 (3) 051...
View Full Document
- Spring '09