Prev Question
Next Question

A Demilitarized Zone (DMZ) is a computer host or small network inserted as a “neutral zone” between a
company’s private network and the outside public network. Usage of a protocol within a DMZ environment is
highly variable based on the specific needs of an organization. Privilege escalation, system is compromised
when the code runs under root credentials, and DoS attacks are the basic weakness of which one of the
following Protocol?

A. Lightweight Directory Access Protocol (LDAP)

B. Simple Network Management Protocol (SNMP)

C. Telnet

D. Secure Shell (SSH)

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *