

MCQOPTIONS
Saved Bookmarks
1. |
Which of the following is not a vulnerability of the application layer? |
A. | Application design bugs may bypass security controls |
B. | Inadequate security controls force “all-or-nothing” approach |
C. | Logical bugs in programs may be by chance or on purpose be used for crashing programs |
D. | Overloading of transport-layer mechanisms |
Answer» E. | |