Que: Which of the following is an example of application layer vulnerability?

a. Cryptographic flaws lead to the privacy issue
b. Very complex application security controls
c. MAC Address Spoofing
d. Weak or non-existent authentication
Answer: Very complex application security controls

Leave a Comment