Which of the following is an example of presentation layer vulnerability?
(a) weak or non-existent mechanisms for authentication
(b) overloading of transport-layer mechanisms
(c) highly complex application security controls
(d) poor handling of unexpected input
The question was asked during an online interview.
Origin of the question is Network Models in section Understanding Network Models for Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,