Answer:
Attackers can exploit missing or misconfigured security headers by manipulating the server to ignore security policies and headers.
Attackers can exploit missing or misconfigured security headers by manipulating the server to ignore security policies and headers.
You may be interested in:
Web Security MCQs - PART 2