List four standard operations that can be performed by the LDAP protocol.

What will be an ideal response?


The LDAP protocol defines six standard operations that can be performed:
·      Authenticating to the directory
·      Searching the directory
·      Reading attributes from the directory
·      Adding entries to the directory
·      Modifying entries in the directory
·      Removing entries from the directory

Computer Science & Information Technology

You might also like to view...

Each class you create becomes a new ________ that can be used to declare variables and create objects.

a. package b. instance c. library d. type.

Computer Science & Information Technology

____________________ scenarios are imagined situations in which the target audience might access a Web site.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ is a brief description of a table and appears as part of the table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is placed in an application by programmers either knowingly or inadvertently to bypass normal authentication?

A. Input validation B. Sandbox C. Back door D. Virus

Computer Science & Information Technology