Answer:
Attackers can exploit APIs by manipulating API requests or responses to disrupt the normal operation of application logic.
Attackers can exploit APIs by manipulating API requests or responses to disrupt the normal operation of application logic.
You may be interested in:
Web Security MCQs - PART 2