NFS maps users on the client to users on the server. Explain why this mapping is a security risk.

What will be an ideal response?

It is trivial for a malicious user to compromise a system to which that user
has local access (for example, by using a boot disk). Working with root priv-
ileges on a compromised client, a malicious user has full access to NFS-
mounted directory hierarchies.

Computer Science & Information Technology

You might also like to view...

If you're presenting a large workbook with many worksheets, you may want to ________ some of the worksheets to provide a more streamlined appearance

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Cisco IOS command is used to alter the maximum number of equal-cost OSPF routes that are inserted into the routing table?

A) ospf-paths max B) maximum-paths max C) ospf maximum-paths max D) ospf load-balance max

Computer Science & Information Technology