in Education by
Which of the following is an example of Transport layer vulnerability? (a) weak or non-existent mechanisms for authentication (b) overloading of transport-layer mechanisms (c) poor handling of unexpected input (d) highly complex application security controls The question was asked in homework. My question comes from Network Models topic in chapter Understanding Network Models for Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct answer is (b) overloading of transport-layer mechanisms Best explanation: Overloading of transport-layer mechanisms is an example of transport layer vulnerability. Other examples of Transport layer vulnerability are mishandling of undefined, poorly defined, Vulnerability that allows “fingerprinting” & other enumeration of host information.

Related questions

0 votes
    Which of the following is not a transport layer vulnerability? (a) Mishandling of undefined, poorly defined (b) The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) MAC Address Spoofing (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of network layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of data-link layer vulnerability? (a) Physical Theft of Data (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of session layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of presentation layer vulnerability? (a) weak or non-existent mechanisms for ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of application layer vulnerability? (a) Cryptographic flaws lead to the privacy ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not physical layer vulnerability? (a) Physical theft of data & hardware (b) Physical ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the data-link layer? (a) MAC Address Spoofing (b) VLAN ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the network layer? (a) Route spoofing (b) Identity & Resource ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not session layer vulnerability? (a) Mishandling of undefined, poorly defined (b) Spoofing and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a vulnerability of the application layer? (a) Application design bugs may bypass security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which 2 protocols are used in the Transport layer of the TCP/IP model? (a) UDP and HTTP (b) TCP and UDP ( ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...