Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
A . HTTPS communication
B. Public and private keys
C. Password encryption
D. Sessions and cookies
Answer: D
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments