1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
2 years ago
6

Active directory and 389 directory server are both compatible with which directory access protocol?

Computers and Technology
1 answer:
bulgar [2K]2 years ago
5 0

Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

<h3>What is Lightweight Directory Access Protocol?</h3>

The Lightweight Directory Access Protocol exists as an open, vendor-neutral, industry standard application protocol for accessing and supporting distributed directory information services over an Internet Protocol network.

LDAP stands used in Microsoft's Active Directory, but can also be utilized in other tools such as Open LDAP, Red Hat Directory Servers, and IBM Tivoli Directory Servers for example. Open LDAP exists as an open source LDAP application. It is a Windows LDAP client and admin tool designed for LDAP database control.

It reserves usernames, passwords, and other core user identities. It utilizes this data to authenticate users when it receives requests or queries and shares the requests with other DSAs.

Hence, Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

To learn more about Lightweight Directory Access Protocol refer to:

brainly.com/question/27960956

#SPJ4

You might be interested in
Which operation is not efficiently supported by heaps?
vodka [1.7K]

In the case above, the operation is not efficiently supported by heaps is Find.

<h3>What are heap operations?</h3>

The operation that are known to often use heaps are:

  • Heapify
  • Find-max (or Find-min)
  • Insertion, etc.

Therefore, In the case above, the operation is not efficiently supported by heaps is Find.

See full question below

Which operation is not efficiently supported by heaps?

a. DeleteMin

b. Find

c. FindMin

d. Insert

e. all of the above are sufficiently supported

Learn more about operation from

brainly.com/question/24214198

#SPJ11

6 0
2 years ago
(1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
cricket20 [7]

Answer:

Following is given the required program. All the steps are described by comments. The sample output for the program is also attached.

I hope it will help you!

Explanation:

5 0
3 years ago
Sarah wants to calculate how much of a profit she would make on producing and selling a new product. Sarah should use a _____.
vagabundo [1.1K]
The answer is spreadsheet. I just did this lesson and I got all of the answers right so I know it's correct.
4 0
3 years ago
1.6<br> What do you call the two parts of the lift that goes down a mine?
Likurg_2 [28]

Answer:

Sheave wheel and hoist cable

Explanation:

The sheave wheel is a pulley wheel that sits above the mine shaft. The hoist cable passes over the sheave wheel and then down the shaft of the mine. The sheave wheel reduces the sliding friction of the mine cable. The head frame is the structure that supports the sheave wheel.

7 0
3 years ago
An adjustable wrench's movable jaw is positioned <br> by​
ki77a [65]
Placing it on top then sliding the dile to close it, can you give me brainlist??
7 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • How to connect to my wireless printer for dummies?
    12·1 answer
  • Before sharing a document, you must first save the document to
    12·1 answer
  • Hot five was the famous band of which musician?
    14·1 answer
  • What is the term for the conversion of a bitmap image to a vector image?
    8·1 answer
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • The third wave of computing was characterized by the introduction of _____.
    10·1 answer
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • Convert hexadecimal number 1AF2 to a decimal number.
    7·1 answer
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!