Answer:
Mapping file uploads and downloads helps identify potential vulnerabilities related to the handling of files in the web application.
Mapping file uploads and downloads helps identify potential vulnerabilities related to the handling of files in the web application.
You may be interested in:
Web Security MCQs