Multiple Choice
What kind of attack allows for the construction of LDAP statements based on user input statements,which can then be used to access the LDAP database or modify the database's information?
A) LDAP poisoning
B) Kerberos injection
C) LDAP injection
D) DAP hijacking
Correct Answer:

Verified
Correct Answer:
Verified
Q8: A list that specifies which subjects are
Q9: The action that is taken by a
Q10: Authentication,authorization,and accounting are sometimes called AAA.
Q11: Although designed to support remote dial-in access
Q12: Discuss the two significant weaknesses of DAC.
Q14: Which access control model is considered to
Q15: Which major types of access involving system
Q16: What is the name for a predefined
Q17: A vulnerable process that is divided between
Q18: A Local Group Policy (LGP)has more options