NFS maps users on the client to users on the server. Explain why this mapping is a security risk.
What will be an ideal response?
It is trivial for a malicious user to compromise a system to which that user
has local access (for example, by using a boot disk). Working with root priv-
ileges on a compromised client, a malicious user has full access to NFS-
mounted directory hierarchies.
Computer Science & Information Technology
You might also like to view...
If you're presenting a large workbook with many worksheets, you may want to ________ some of the worksheets to provide a more streamlined appearance
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which Cisco IOS command is used to alter the maximum number of equal-cost OSPF routes that are inserted into the routing table?
A) ospf-paths max B) maximum-paths max C) ospf maximum-paths max D) ospf load-balance max
Computer Science & Information Technology