Describe the two risks in using Telnet to remotely administer a server and communicate with other servers on your network and explain how to mitigate those risks.
What will be an ideal response?
If you can remotely control a computer, what is to stop others from doing the same? Thankfully, Telnet does not allow just anyone
to log on and wreak havoc with your network. You must enter a user name and password to access a Telnet server. Unfortunately, Telnet does not have any form of encryption. If someone intercepted the conversation between a Telnet client and Telnet server, he or she would see all of the commands you type as well as the results from the Telnet server. As a result, Telnet is rarely used on the Internet and has been replaced with Secure Shell (SSH), a terminal emulation program that looks exactly like Telnet but encrypts the data.
You might also like to view...
The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.
A. ?performance and price B. ?performance and power consumption C. ?heating problems and battery drain D. ?efficiency and price
A 10BaseFL network uses the __________________ signal type.
Fill in the blank(s) with the appropriate word(s).
Floating-point literals are of type ________ by default.
a. float b. double c. real d. decimal
A method's ____ includes the method identifier and possibly other necessary identifying information.
A. title B. space C. header D. opener