a. weak or non-existent mechanisms for authentication |
b. overloading of transport-layer mechanisms |
c. highly complex application security controls |
d. poor handling of unexpected input |
Answer: poor handling of unexpected input |
a. weak or non-existent mechanisms for authentication |
b. overloading of transport-layer mechanisms |
c. highly complex application security controls |
d. poor handling of unexpected input |
Answer: poor handling of unexpected input |