Ask Question
25 January, 21:45

Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the network resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?

Answers (1)
  1. 25 January, 22:53
    LDAP (Lightweight Directory Access Protocol) is the correct answer.


    Because when the hackers attack on the computer network resources and also theft and make unavailable some computer resources after that, they have done this by exploiting the individual protocols. So, that's why LDAP protocol should be needed to secure from the following attacks and Lightweight Directory Access Protocol is used for both client and the server-side protocol.
Know the Answer?