NFS maps users on the client to users on the server. Explain why this mapping is a security risk.

What will be an ideal response?


It is trivial for a malicious user to compromise a system to which that user
has local access (for example, by using a boot disk). Working with root priv-
ileges on a compromised client, a malicious user has full access to NFS-
mounted directory hierarchies.

Computer Science & Information Technology

You might also like to view...

The shortcut for beginning a new page is ____.

A. CTRL + ENTER B. CTRL + ALT + ENTER C. ENTER D. ENTER + Pg Dn

Computer Science & Information Technology

Bar code readers use ________ embedded in them to read bar codes.

A. photoelectric cells B. magnetic cells C. coprocessors D. RFID microchip

Computer Science & Information Technology

Video resolutions can be expressed as width x height.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?

A. Cross-platform compatibility issues between personal devices and server-based applications B. Lack of controls in place to ensure that the devices have the latest system patches and signature files C. Non-corporate devices are more difficult to locate when a user is terminated D. Non-purchased or leased equipment may cause failure during the audits of company-owned assets

Computer Science & Information Technology