MCQOPTIONS
Saved Bookmarks
| 1. |
Which of the following is an example of presentation layer vulnerability? |
| A. | weak or non-existent mechanisms for authentication |
| B. | overloading of transport-layer mechanisms |
| C. | highly complex application security controls |
| D. | poor handling of unexpected input |
| Answer» E. | |