adplus-dvertising
frame-decoration

Question

Which of the following is an example of presentation layer vulnerability?

a.

weak or non-existent mechanisms for authentication

b.

overloading of transport-layer mechanisms

c.

highly complex application security controls

d.

poor handling of unexpected input

Posted under Cyber Security

Answer: (d).poor handling of unexpected input

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is an example of presentation layer vulnerability?

Similar Questions

Discover Related MCQs

Q. Which of the following is an example of application layer vulnerability?

Q. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

Q. TCP/IP is composed of _______ number of layers.

Q. Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

Q. Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________

Q. Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

Q. TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

Q. RoBOT is abbreviated as ___________

Q. There are __________ different versions of IP popularly used.

Q. ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

Q. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

Q. Which of them is not an attack done in the network layer of the TCP/IP model?

Q. Which of them is not an appropriate method of router security?

Q. Which 2 protocols are used in the Transport layer of the TCP/IP model?

Q. Which of the protocol is not used in the network layer of the TCP/IP model?

Q. ____________ protocol attack is done in the data-link layer.