Answer:
If an attacker gains access to database credentials stored in a configuration file, they can use the credentials to access and manipulate the database, potentially leading to data breaches or data manipulation.
If an attacker gains access to database credentials stored in a configuration file, they can use the credentials to access and manipulate the database, potentially leading to data breaches or data manipulation.
You may be interested in:
Web Security MCQs