What are some of the Telnet service vulnerabilities?

What will be an ideal response?


Telnet is a popular service that allows users to connect to a UNIX, Linux, or Windows computer from remote locations. Hackers love this because it sends data unencrypted over the network and they can easily take advantage of this service by using brute-force and dictionary attacks to connect to a target system. Therefore, to increase the security of a UNIX or Linux server, telnet must be disabled.Use ssh instead, if you need to get a command line interface from a remote computer.

Computer Science & Information Technology

You might also like to view...

#include is an example of a(n)

A) comment. B) I/O statement. C) preprocessor directive. D) stream directive. E) compiler option.

Computer Science & Information Technology

Draw a binary search tree that results from inserting the following elements: 12, 16, 9, 1, 15, 13

What will be an ideal response?

Computer Science & Information Technology

What are the two different variations of network address translation (NAT)?

What will be an ideal response?

Computer Science & Information Technology

When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology