C/D? If the question means the "most effective" way to address unauthorized LDAP access, D makes more sense, but if it's asking for the "first step" or something more general, C could also apply. Does it specify best or first?
Q: 9
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP)
implementation, which could potentially allow unauthorized access to sensitive information. The
company has decided to implement risk mitigation strategies to reduce the risk associated with this
vulnerability.
Which risk mitigation strategy will meet the needs of the company?
Options
Discussion
C tbh. IDPS can spot suspicious LDAP traffic and raise alerts for potential attacks, so it feels like a solid mitigation move if you want monitoring and rapid response. I think direct hardening (like D) is stronger, but based on the wording, C isn't a bad pick either. Open to pushback if I'm off.
Be respectful. No spam.
Question 9 of 30