An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default?
|Compliance and Operational Security|
|Threats and Vulnerabilities|
|Application, Data and Host Security|
|Access Control and Identity Management|