NFS maps users on the client to users on the server. Explain why this mapping is a security risk.
What will be an ideal response?
It is trivial for a malicious user to compromise a system to which that user
has local access (for example, by using a boot disk). Working with root priv-
ileges on a compromised client, a malicious user has full access to NFS-
mounted directory hierarchies.
You might also like to view...
The shortcut for beginning a new page is ____.
A. CTRL + ENTER B. CTRL + ALT + ENTER C. ENTER D. ENTER + Pg Dn
Bar code readers use ________ embedded in them to read bar codes.
A. photoelectric cells B. magnetic cells C. coprocessors D. RFID microchip
Video resolutions can be expressed as width x height.
Answer the following statement true (T) or false (F)
Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?
A. Cross-platform compatibility issues between personal devices and server-based applications B. Lack of controls in place to ensure that the devices have the latest system patches and signature files C. Non-corporate devices are more difficult to locate when a user is terminated D. Non-purchased or leased equipment may cause failure during the audits of company-owned assets