What are some of the security risks with using CVS?
What will be an ideal response?
First, since CVS uses rsh, that in it self is a major security risk. Rsh transmits data in the clear text and does not allow for any kind of authentication. Also in CVS the developers must have permissions to modify the project so that leaves the door open for developers to hack it.
You might also like to view...
List and describe the status indicators that apply only to a dynamic disk.
What will be an ideal response?
If you select a text wrapping setting of Top and Bottom, text is prevented from wrapping around a table
Indicate whether the statement is true or false
When the border of a shape in a SmartArt graphic appears as a series of dashes (----- ), the ________ can be edited
Fill in the blank(s) with correct word
Fields with a ________ data type can use any aggregate function.
Fill in the blank(s) with the appropriate word(s).