Which of the following is an example of application layer vulnerability?
(a) Cryptographic flaws lead to the privacy issue
(b) Very complex application security controls
(c) MAC Address Spoofing
(d) Weak or non-existent authentication
I had been asked this question in an online interview.
I'm obligated to ask this question of Network Models in chapter Understanding Network Models for Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,