Which of the following is not a vulnerability of the application layer?
(a) Application design bugs may bypass security controls
(b) Inadequate security controls force “all-or-nothing” approach
(c) Logical bugs in programs may be by chance or on purpose be used for crashing programs
(d) Overloading of transport-layer mechanisms
I got this question by my school teacher while I was bunking the class.
Question is from Network Models in portion Understanding Network Models for Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,