Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
A . HTTPS communication
B . Public and private keys
C . Password encryption
D . Sessions and cookies
Answer: D
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund