What is the protocol called that defines how a client can access information perform operations and share directory data on a directory sever?

1 Answer

Answer :

LDAP (Lightweight Directory Access Protocol)

Related questions

Description : When cache process starts hit and miss rate defines in cache directory: a. during search reads b. during search writes c. during replace writes d. during finding writes

Last Answer : a. during search reads

Description : A successor auditor is required to communicate with the previous auditor. The primary concern in this communication is a. Information which will help the successor auditor in determining whether the client ... a more efficient audit. d. To save successor auditor time and money in gathering data.

Last Answer : Information which will help the successor auditor in determining whether the client management has integrity.

Description : The main function of the ALU is: a) Store Data and Information for Future Use b) Perform arithmetic and logical operations c) Control Computer Output, such as Printing d) None of These

Last Answer : b) Perform arithmetic and logical operations

Description : The main function of the ALU is to a) perform arithmetic and logical operations b) store data and information for future use c) control computer output, such as printing d) monitor all computer activities e) None of these

Last Answer : a) perform arithmetic and logical operations

Description : What is the main function of Session layer in OSI model? a. Defines how data is formatted between the devices b. Made physical connection between server and client c. Both a and b d. None of the above

Last Answer : a. Defines how data is formatted between the devices

Description : What protocol is the Active Directory database based on? a. LDAP b. TCP c. SQL d. HTTP

Last Answer : d. HTTP

Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these

Last Answer : g. Allof these

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for (A) Hyper Text Translation ... ) Hyper Text Transfer Protocol (C) High TeraByte Transfer Protocol (D) Hypervisor Test Translation Protocol

Last Answer : (B) Hyper Text Transfer Protocol

Description : An extensive understanding of the client's business and industry and knowledge about the company's operations are essential for doing an adequate audit. For a new client, most of this information is obtained ... . From the predecessor auditor. c. From the permanent file. d. At the client's premises

Last Answer : At the client's premises

Description : An extensive understanding of the client's business and industry and knowledge about the company's operations are essential for doing an adequate audit. For a new client, most of this information is obtained ... From the predecessor auditor. c. From the permanent file. d. At the client's premises.

Last Answer : At the client's premises.

Description : A member in public practice may perform for a contingent fee any professional services for a client for whom the member or member's firm performs a. An audit. b. A review. c. A compilation used only by management. d. An audit of prospective financial information

Last Answer : A compilation used only by management.

Description : A member in public practice may perform for a contingent fee any professional services for a client for whom the member or member's firm performs a. An audit. b. A review. c. A compilation used only by management. d. An audit of prospective financial information.

Last Answer : A compilation used only by management.

Description : When an auditor believes that an understanding with the client has not been established, he or she should ordinarily a. Perform the audit with increased professional skepticism. b. Decline to accept ... reports. d. Obtain information about the client's business and the industry where it operates

Last Answer : Decline to accept or perform the audit.

Description : When an independent auditor is approached to perform an audit for the first time, he/she should make inquiries of the predecessor auditor. Inquiries are necessary because the predecessor may ... documentation by the predecessor auditor can be utilized. d. The engagement proposal should be accepted

Last Answer : The engagement proposal should be accepted

Description : The secondary storage devices can only store data but they cannot perform A) Arithmetic Operation B) Logic operation C) Fetch operations D) Either of the above

Last Answer : Answer : D

Description : The part of a processor which contains hardware necessary to perform all the operations required by a computer: a) Data path b) Controller c) Registers d) Cache

Last Answer : Answer: a Explanation: A processor is a part of the computer which does all the data manipulation and decision making. A processor comprises of: A data path which contains the hardware necessary to ... the data path what needs to be done. The registers act as intermediate storage for the data

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : Either of the above

Description : What is the control unit's function in the CPU? a. To transfer data to primary storage b. to store program instruction c. to perform logic operations d. to decode program instruction

Last Answer : b. to store program instruction

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : d. Either of the above

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : d. Either of the above

Description : Arithmetic and Logic Unit I. Perform Arithmetic operations II. Store Data III. Perform comparisons IV. Communicate with input devices Which of the following is true ? (1) I only (2) III only (3) I and II (4) I and III

Last Answer : I and III

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines an IP address ____: a) Same b) Unique c) Different

Last Answer : c) Different

Description : Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines an IP address ____: a) Same b) Unique c) Different d) None of These

Last Answer : c) Different

Description : EDI standard a. is not easily available b. defines several hundred transaction sets for various business forms c. is not popular d. defines only a transmission protocol

Last Answer : b. defines several hundred transaction sets for various business forms 

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : Is Directory of Open Access Journals reputable?

Last Answer : This may sound obvious, but checking the Open Access Journals (DOAJ) directory is a great way to start your paper submission process. Here, you can check the open access status of a ... which is limited to pure open access journals that are published under the permissible Creative Commons license.

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : What is rational at any given time depends on? a) The performance measure that defines the criterion of success b) The agent’s prior knowledge of the environment c) The actions that the agent can perform d) All of the mentioned

Last Answer : d) All of the mentioned

Description : IMAP stand for………… a. Internet message access protocol b. Internet mailing access protocol c. Information access protocol d. None of these

Last Answer : a. Internet message access protocol

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : What equation defines the composition of an ISDN basic access line? A. B+2D B. B+D C. 2B+2D D. 2B+D

Last Answer : D. 2B+D

Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above

Last Answer : 1-persistent

Description : ……………….. contains information that defines valid values that are stored in a column or data type. A) View B) Rule C) Index D) Default

Last Answer : C) Index

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : A set of rules for telling the computer what operations to perform is called a a) procedural language b) structures c) natural language d) programming language e) None of these

Last Answer : d) programming language

Description : What plants can I sever and plant?

Last Answer : Depending on the plant a little, you can do it with all of them. If they’re tough to propogate you can always try air layering.

Description : How do I treat yellow leaves on a boxwood probably caused by the sever weather this winter?

Last Answer : Need Answer

Description : My first is in wield, sever bones and marrow. My second is in blade, forged in cold steel. My third is in arbalest, and also in arrows. My fourth is in power, plunged through a shield. My fifth is in honour, and also in vows My last will put an end to it all.What am I? -Riddles

Last Answer : A weapon!

Description : What type Galactosemia is sever or most sever?

Last Answer : sever type1 classic is the most sever type,....... sever type1 (classic): galactosemia is the most sever galactosemic disorder

Description : Why might a toy store owner gripe about a sever storm in December?

Last Answer : Either it prevented customers coming to his store to buyChristmas presents, or it prevented the delivery of stuff that hecould sell to his customers during the busiest time of theyear.

Description : Did death sever familial ties for the Chinese?

Last Answer : What is the answer ?

Description : What type Galactosemia is sever or most sever?

Last Answer : sever type1 classic is the most sever type,....... sever type1 (classic): galactosemia is the most sever galactosemic disorder