{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Flearningmaterials.hateblo.jp%2Fentry%2F2016%2F12%2F23%2F160728\" title=\" ISC CISSP dump file      CISSP Exam PDF        CISSP prep          CISSP Material  - learningmaterials\u2019s blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://learningmaterials.hateblo.jp/entry/2016/12/23/160728","author_url":"https://blog.hatena.ne.jp/learningmaterials/","blog_title":"learningmaterials\u2019s blog","width":"100%","version":"1.0","categories":[],"blog_url":"https://learningmaterials.hateblo.jp/","author_name":"learningmaterials","image_url":null,"type":"rich","provider_name":"Hatena Blog","title":" ISC CISSP dump file      CISSP Exam PDF        CISSP prep          CISSP Material ","provider_url":"https://hatena.blog","published":"2016-12-23 16:07:28","height":"190","description":"NO.1 Which of the following is the BIGGEST weakness when using native Lightweight Directory Access Protocol (LDAP) for authentication?A. Passwords are passed in cleartextB. Authorizations are not included in the server responseC. The authentication session can be replayedD. Unsalted hashes are passe\u2026"}