MCQOPTIONS
Saved Bookmarks
| 1. |
______________ takes advantage if hidden fields that work as the only security measure in some applications. |
| A. | Parameter tampering |
| B. | Data tampering |
| C. | Tampering of network topology |
| D. | Protocol tampering |
| Answer» B. Data tampering | |