Answer:
Attackers can exploit weak access controls by manipulating them to gain unauthorized access to transactional processes and tamper with them.
Attackers can exploit weak access controls by manipulating them to gain unauthorized access to transactional processes and tamper with them.
You may be interested in:
Web Security MCQs - PART 2