What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

A. LDAP poisoning
B. Kerberos injection
C. LDAP injection
D. DAP hijacking


Answer: C

Computer Science & Information Technology

You might also like to view...

Exchange Online allows employees to collaborate with one another, share documents, post announcements, and track tasks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When one process spawns another, the spawned process is referred to as the __________

A) ?trap process ? B) ?child process C) ?stack process D) ?parent process

Computer Science & Information Technology

Will changing a layer's blending mode to Lighten remove a dark

background as it blends? What will be an ideal response?

Computer Science & Information Technology

An ISACA certification targeted at IT professionals who are in careers that link IT risk management with enterprise risk management is known as the __________.

A. CGEIT B. CISM C. CISSP D. CRISC

Computer Science & Information Technology