

MCQOPTIONS
Saved Bookmarks
1. |
Which of the following is an example of presentation layer vulnerability? |
A. | weak or non-existent mechanisms for authentication |
B. | overloading of transport-layer mechanisms |
C. | highly complex application security controls |
D. | poor handling of unexpected input |
Answer» E. | |