Answer:
Time-based attacks exploit vulnerabilities related to the passage of time, delays, or timing differences in the application logic.
Time-based attacks exploit vulnerabilities related to the passage of time, delays, or timing differences in the application logic.
You may be interested in:
Web Security MCQs - PART 2