Multiple Choice
Matching
-An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.
A) Account expiration
B) Discretionary access control (DAC)
C) Extended TACACS (XTACACS)
D) Job rotation
E) LDAP injection attack
F) Least privilege
G) Mandatory access control (MAC)
H) Separation of duties
I) TACACS+
J) Time-of-day restriction
Correct Answer:

Verified
Correct Answer:
Verified
Q11: Although designed to support remote dial-in access
Q12: Select below the access control model that
Q13: User accounts that remain active after an
Q16: What is the name for a predefined
Q18: List the steps for RADIUS authentication with
Q20: Matching<br>-Providing only the minimum amount of privileges
Q21: A vulnerable process that is divided between
Q22: To prevent one individual from having too
Q25: A user or a process functioning on
Q29: Describe how Kerberos works.