73.6k views
1 vote
Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the network resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?

User AveryLiu
by
8.7k points

1 Answer

0 votes

Answer:

LDAP(Lightweight Directory Access Protocol) is the correct answer.

Step-by-step explanation:

Because when the hackers attack on the computer network resources and also theft and make unavailable some computer resources after that, they have done this by exploiting the individual protocols. So, that's why LDAP protocol should be needed to secure from the following attacks and Lightweight Directory Access Protocol is used for both client and the server-side protocol.

User Carl Dacosta
by
7.7k points