1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
3 years ago
8

Q. Which protocol would best serve to authorize users to access directory services?

Computers and Technology
1 answer:
Arlecino [84]3 years ago
6 0

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

You might be interested in
How to become a software tester?
HACTEHA [7]
You should look on google to see if there are any websites
5 0
4 years ago
PLEASE HELP!
Morgarella [4.7K]
An query because his ideas are effective
8 0
4 years ago
Read 2 more answers
Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
IrinaK [193]

The answer is False.

The word "declining" means going down. So, in this case, the employees would go down or leave.

7 0
3 years ago
Choose the best answer to complete the sentence.
zhuklara [117]

Answer:

the first one is A

the second question is B,C,F

Explanation:edg2020

5 0
4 years ago
A library function that can find one string inside another is:
Lostsunrise [7]
In c# and java it's indexOf
7 0
3 years ago
Other questions:
  • What change does NOT need to be made to the above cover letter excerpt before sending it to an employer? a. Remove background co
    6·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • What form of internet access currently uses a technology called 4gb?
    10·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
    7·1 answer
  • What does the following code segment do?
    13·1 answer
  • When you check the spelling in a document, one of the options is to add unrecognized words to the dictionary. If you were workin
    8·1 answer
  • Questions Presscomion
    9·1 answer
  • The span was so long, the height so great, and the enterprise likely to be so costly, that few thought of it as something begun
    9·2 answers
  • Treating others with respect, even when they're impolite, is considered
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!