Que: Which of the following is an example of presentation layer vulnerability?

a. weak or non-existent mechanisms for authentication
b. overloading of transport-layer mechanisms
c. highly complex application security controls
d. poor handling of unexpected input
Answer: poor handling of unexpected input

Leave a Comment