1.

Which of the following is not a vulnerability of the application layer?

A. Application design bugs may bypass security controls
B. Inadequate security controls force “all-or-nothing” approach
C. Logical bugs in programs may be by chance or on purpose be used for crashing programs
D. Overloading of transport-layer mechanisms
Answer» E.


Discussion

No Comment Found