1.

Which of the following is an example of presentation layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) highly complex application security controls(d) poor handling of unexpected inputThe question was asked during an online interview.Origin of the question is Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (d) poor handling of unexpected input

For explanation: Poor handling of unexpected input is an EXAMPLE of presentation LAYER VULNERABILITY. Cryptographic FLAWS may be exploited to circumvent privacy, unintentional use of superficially SUPPLIED input are some other examples of presentation layer vulnerability.



Discussion

No Comment Found

Related InterviewSolutions