Answer:
Attackers can use account enumeration to manipulate the server and reveal valid user accounts through the authentication process, facilitating authentication bypass.
Attackers can use account enumeration to manipulate the server and reveal valid user accounts through the authentication process, facilitating authentication bypass.
You may be interested in:
Web Security MCQs - PART 2