The nis client accepts the first response to its query that


1. The second line of the Web server starting script puts the process ID number of the Web server wrapper into a file. Why?

2. This exercise reconsiders the use of NIS to distribute user information such as password hashes.

a. In general, why might an administration want to use encryption techniques to protect the transmission of NIS records over a network?

b. Why is secrecy of the NIS records not important to the system administrators?

c. Assume the devnet firewall (and the inner and outer firewalls) did not prevent outside users from monitoring the development network. How important would secrecy of the NIS records be then? Why?

d. The NIS client accepts the first response to its query that it receives from any NIS server. Why is physical control of the development network critical to the decision not to use cryptography to protect the NIS network traffic?

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: The nis client accepts the first response to its query that
Reference No:- TGS01712687

Expected delivery within 24 Hours