1.

Which of the following is an example of presentation layer vulnerability?

A. weak or non-existent mechanisms for authentication
B. overloading of transport-layer mechanisms
C. highly complex application security controls
D. poor handling of unexpected input
Answer» E.


Discussion

No Comment Found