Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 90 Topic 10 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 90 Topic 10 Discussion

312-50v13 Exam Topic 10 Question 90 Discussion:
Question #: 90
Topic #: 10

During a black-box security assessment of a large enterprise network, the penetration tester scans the internal environment and identifies that TCP port 389 is open on a domain controller. Upon further investigation, the tester runs the ldapsearch utility without providing any authentication credentials and successfully retrieves a list of usernames, email addresses, and departmental affiliations from the LDAP directory. The tester notes that this sensitive information was disclosed without triggering any access control mechanisms or requiring login credentials. Based on this behavior, what type of LDAP access mechanism is most likely being exploited?


A.

LDAP over SSL (LDAPS)


B.

Authenticated LDAP with Kerberos


C.

Anonymous LDAP binding


D.

LDAP via RADIUS relay


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.