Answer:
In the event of a detected form tampering attempt, web applications can take action by rejecting the tampered form data and logging the incident for further analysis.
In the event of a detected form tampering attempt, web applications can take action by rejecting the tampered form data and logging the incident for further analysis.
You may be interested in:
Web Security MCQs