Answer:
Attackers can exploit weaknesses in session token transmission by eavesdropping on unencrypted session tokens transmitted over insecure channels.
Attackers can exploit weaknesses in session token transmission by eavesdropping on unencrypted session tokens transmitted over insecure channels.
You may be interested in:
Web Security MCQs - PART 2