Answer:
Attackers can exploit weak password policies by using brute force attacks or exploiting weak passwords to gain unauthorized access, bypassing authorization.
Attackers can exploit weak password policies by using brute force attacks or exploiting weak passwords to gain unauthorized access, bypassing authorization.
You may be interested in:
Web Security MCQs - PART 2