1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
2 years ago
6

Active directory and 389 directory server are both compatible with which directory access protocol?

Computers and Technology
1 answer:
bulgar [2K]2 years ago
5 0

Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

<h3>What is Lightweight Directory Access Protocol?</h3>

The Lightweight Directory Access Protocol exists as an open, vendor-neutral, industry standard application protocol for accessing and supporting distributed directory information services over an Internet Protocol network.

LDAP stands used in Microsoft's Active Directory, but can also be utilized in other tools such as Open LDAP, Red Hat Directory Servers, and IBM Tivoli Directory Servers for example. Open LDAP exists as an open source LDAP application. It is a Windows LDAP client and admin tool designed for LDAP database control.

It reserves usernames, passwords, and other core user identities. It utilizes this data to authenticate users when it receives requests or queries and shares the requests with other DSAs.

Hence, Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

To learn more about Lightweight Directory Access Protocol refer to:

brainly.com/question/27960956

#SPJ4

You might be interested in
a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
alexira [117]

Answer:

6.7seconds

Explanation:

4 0
3 years ago
A binary search can be performed only on ____.
11Alexandr11 [23.1K]
A binary search can be performed only on a comparable lists
3 0
4 years ago
Supplies/material used in iron​
Novay_Z [31]
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
3 0
3 years ago
Assume that you have an array of integers named arr. Which of these code segments print the same results?
tresset_1 [31]

Answer:

II and III only

Explanation:

In Code segment II, the output of the array will be started form arr[0] and ends at the arr[length]. Because loop starts from 0 and ends at length of array. This will print the full array data.

In code segment III, the output will be all values of array as loop starts form first index and ends at last index.

On the other hand I code segment prints all array values except last value of the array. As the loop shows that, it will terminate at second last value of the array.

4 0
3 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Other questions:
  • What following functions does browser perform
    5·1 answer
  • Which of the following refers to rules written by an organization or entity to guide behavior in a particular setting or situati
    7·2 answers
  • Someone may choose to own a car instead of leasing because:
    14·2 answers
  • Write the simplest statement that prints the following on a single line: 3 2 1 Go! Note: Whitespace (blank spaces / blank lines)
    11·1 answer
  • Give an example of an outdated memory or storage device what do you think they are outdated
    12·1 answer
  • What feature of virtualization software allows you to revert to a previous point in time in the event you make an unrecoverable
    9·1 answer
  • Como funciona la televisión
    7·1 answer
  • Match the elements of a web page with their description
    15·2 answers
  • How have cell phones improved our lives​
    5·1 answer
  • What web browser feature would be particularly useful when using public computers?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!