List of questions
Related questions
Question 275 - 312-50v12 discussion
John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.
What is the tool employed by John to gather information from the IDAP service?
A.
jxplorer
B.
Zabasearch
C.
EarthExplorer
D.
Ike-scan
Your answer:
0 comments
Sorted by
Leave a comment first