Answer:
Attackers can exploit the lack of encryption by manipulating the server to ignore encryption and potentially eavesdrop on sensitive data.
Attackers can exploit the lack of encryption by manipulating the server to ignore encryption and potentially eavesdrop on sensitive data.
You may be interested in:
Web Security MCQs - PART 2