What approach does NFS take to counteract hostile interception?
A.
no authentication or encryption
B.
user-supplied password used as secret key for encrypted communications
C.
end-to-end TLS encryption, with PKI certificates
D.
SHA1 credential hashing authentication