Which of the following is an example of session layer vulnerability?
(a) weak or non-existent mechanisms for authentication
(b) overloading of transport-layer mechanisms
(c) poor handling of unexpected input
(d) highly complex application security controls
The question was posed to me in a job interview.
This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security