Ask Question
18 March, 01:52

Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the network resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?

+4
Answers (1)
  1. 18 March, 03:42
    0
    LDAP (Lightweight Directory Access Protocol) is the correct answer.

    Explanation:

    Because when the hackers attack on the computer network resources and also theft and make unavailable some computer resources after that, they have done this by exploiting the individual protocols. So, that's why LDAP protocol should be needed to secure from the following attacks and Lightweight Directory Access Protocol is used for both client and the server-side protocol.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the network ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers