a. weak or non-existent mechanisms for authentication |
b. overloading of transport-layer mechanisms |
c. poor handling of unexpected input |
d. highly complex application security controls |
Answer: weak or non-existent mechanisms for authentication |
a. weak or non-existent mechanisms for authentication |
b. overloading of transport-layer mechanisms |
c. poor handling of unexpected input |
d. highly complex application security controls |
Answer: weak or non-existent mechanisms for authentication |