

MCQOPTIONS
Saved Bookmarks
1. |
______________ takes advantage if hidden fields that work as the only security measure in some applications. |
A. | Parameter tampering |
B. | Data tampering |
C. | Tampering of network topology |
D. | Protocol tampering |
Answer» B. Data tampering | |