Matching
-An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.
A) Account expiration
B) Discretionary access control (DAC)
C) Extended TACACS (XTACACS)
D) Job rotation
E) LDAP injection attack
F) Least privilege
G) Mandatory access control (MAC)
H) Separation of duties
I) TACACS+
J) Time-of-day restriction
Correct Answer:
Verified
Q2: The action that is taken by a
Q14: A list that specifies which subjects are
Q26: Matching
-The practice of requiring that processes should
Q27: In the DAC model, _ can create
Q28: To prevent one individual from having too
Q30: Matching
-The second version of the Terminal Access
Q32: Matching
-The most restrictive access control model, typically
Q33: To assist with controlling orphaned and dormant
Q34: Matching
-The current version of the Terminal Access
Q35: During RADIUS authentication,what type of packet includes
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents