Answer:
Attackers can exploit insufficient session management by hijacking active sessions or creating unauthorized sessions to gain access to protected resources, bypassing authorization.
Attackers can exploit insufficient session management by hijacking active sessions or creating unauthorized sessions to gain access to protected resources, bypassing authorization.
You may be interested in:
Web Security MCQs - PART 2