What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?
A. LDAP poisoning
B. Kerberos injection
C. LDAP injection
D. DAP hijacking
Answer: C
Computer Science & Information Technology
You might also like to view...
Exchange Online allows employees to collaborate with one another, share documents, post announcements, and track tasks.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When one process spawns another, the spawned process is referred to as the __________
A) ?trap process ? B) ?child process C) ?stack process D) ?parent process
Computer Science & Information Technology
Will changing a layer's blending mode to Lighten remove a dark
background as it blends? What will be an ideal response?
Computer Science & Information Technology
An ISACA certification targeted at IT professionals who are in careers that link IT risk management with enterprise risk management is known as the __________.
A. CGEIT B. CISM C. CISSP D. CRISC
Computer Science & Information Technology