in Education by
Which of the following is an example of session layer vulnerability? (a) weak or non-existent mechanisms for authentication (b) overloading of transport-layer mechanisms (c) poor handling of unexpected input (d) highly complex application security controls The question was posed to me in a job interview. This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right choice is (a) weak or non-existent mechanisms for authentication For explanation: Weak or non-existent mechanisms for authentication is an example of session layer vulnerability. Other examples are spoofing and the hijacking of data based on failed-authentication attempts & passing of session-credentials allowing intercept and unauthorized use.

Related questions

0 votes
    Which of the following is not session layer vulnerability? (a) Mishandling of undefined, poorly defined (b) Spoofing and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) MAC Address Spoofing (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of network layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) Physical Theft of Data (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of Transport layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of presentation layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of application layer vulnerability? (a) Cryptographic flaws lead to the privacy ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not physical layer vulnerability? (a) Physical theft of data & hardware (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the data-link layer? (a) MAC Address Spoofing (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the network layer? (a) Route spoofing (b) Identity & Resource ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a transport layer vulnerability? (a) Mishandling of undefined, poorly defined (b) The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the application layer? (a) Application design bugs may bypass security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...