What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

A. LDAP poisoning
B. Kerberos injection
C. LDAP injection
D. DAP hijacking

Answer: C

Computer Science & Information Technology

You might also like to view...

Which tab displays the tools for creating charts?

A) Chart B) Data C) View D) Insert

Computer Science & Information Technology

Which of the following physical security measures should be applied when using a video monitoring system?

A) Installing cameras at all entrances and exits of a building B) Using night vision-capable cameras if external lighting isn’t adequate C) Placing cameras at a height that is difficult for someone to reach D) All of the above

Computer Science & Information Technology