Answer:
Access logs can provide insights into user activities and help detect anomalous patterns indicative of authorization bypass attempts, aiding in detection and prevention.
Access logs can provide insights into user activities and help detect anomalous patterns indicative of authorization bypass attempts, aiding in detection and prevention.
You may be interested in:
Web Security MCQs - PART 2