1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
9

Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo

rk resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?
Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

Answer:

LDAP(Lightweight Directory Access Protocol) is the correct answer.

Explanation:

Because when the hackers attack on the computer network resources and also theft and make unavailable some computer resources after that, they have done this by exploiting the individual protocols. So, that's why LDAP protocol should be needed to secure from the following attacks and Lightweight Directory Access Protocol is used for both client and the server-side protocol.

You might be interested in
When using a calculator, be sure you press ____ first?
sertanlavr [38]
The answer to this question is: CE
Calculator will memorize the input that you made from previous calculation until you press the = button.
CE stands for clear data, which means that by pressing this, you will eliminate the calculation from previous effort and start the new calculation on a blank state
4 0
3 years ago
Read 2 more answers
Which is the most recent version of microsoft windows?
nignag [31]

Answer:

Windows 11, version 21H2.

Explanation:

this is the latest version as of October 2021.

I hope I helped you!

4 0
2 years ago
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?​
Butoxors [25]
<span>I would say a mesh topology</span>
6 0
3 years ago
Change the case of letter by​
Evgesh-ka [11]

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

8 0
3 years ago
Read 2 more answers
You are modeling a small part of an online flight reservation system, according to the following description. A flight is a sing
Law Incorporation [45]

Answer:

Explanation:

The database schema can have following tables:

1. airport_table(apcode, apcity, apcountry)

2. airline_table(aid, aname, acountry)

3. flight_table(fid, aid, arrtime, depttime)

4. passenger_table(pid, pname, pcity, pcountry)

5 booking_table(bid, bdate, pid)

See attachment for the diagram

4 0
4 years ago
Other questions:
  • A user reports that a PC gets a BSOD on startup. A technician has researched the error message and found a driver to replace. Wh
    8·1 answer
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    6·1 answer
  • Imagine the user types in a complete sentence, but we want to read only the first word and place it in the String variable word.
    11·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • Which famous individuals was born on october 31st?
    7·1 answer
  • Which of the following, when used in conjunction with hyperlinks, can be useful for easily navigating a Word document? : *
    7·1 answer
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • How to add more then one picture on a brainy question really need this
    8·1 answer
  • Please help with coding assignment.
    11·1 answer
  • What is the process to correct a single spelling mistake that has been indicated by the spelling checker in PowerPoint Online?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!