Each ________ in the LDAP inverted tree is uniquely identified by a distinguished name (DN) that defines the complete path from the top of the tree to the object

a. Protocol
b. Object
c. Branch
d. Control

B. This provides an unambiguous representation of the name of any resource.

Computer Science & Information Technology

You might also like to view...

A Type _____ fire extinguisher can put out most fires

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ are used to signal errors or unexpected events that occur while a program is running.

A) Virtual functions B) Destructors C) Exceptions D) Templates E) None of the above

Computer Science & Information Technology