Answer:
Successful RCE attacks can lead to unauthorized modification or deletion of data, compromising the integrity of a web application.
Successful RCE attacks can lead to unauthorized modification or deletion of data, compromising the integrity of a web application.
You may be interested in:
Web Security MCQs - PART 2