Describe the two risks in using Telnet to remotely administer a server and communicate with other servers on your network and explain how to mitigate those risks.

What will be an ideal response?


If you can remotely control a computer, what is to stop others from doing the same? Thankfully, Telnet does not allow just anyone
to log on and wreak havoc with your network. You must enter a user name and password to access a Telnet server. Unfortunately, Telnet does not have any form of encryption. If someone intercepted the conversation between a Telnet client and Telnet server, he or she would see all of the commands you type as well as the results from the Telnet server. As a result, Telnet is rarely used on the Internet and has been replaced with Secure Shell (SSH), a terminal emulation program that looks exactly like Telnet but encrypts the data.
 

Computer Science & Information Technology

You might also like to view...

The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.

A. ?performance and price B. ?performance and power consumption C. ?heating problems and battery drain D. ?efficiency and price

Computer Science & Information Technology

A 10BaseFL network uses the __________________ signal type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Floating-point literals are of type ________ by default.

a. float b. double c. real d. decimal

Computer Science & Information Technology

A method's ____ includes the method identifier and possibly other necessary identifying information.

A. title B. space C. header D. opener

Computer Science & Information Technology