Answer:
Knowledge of the software used to create or modify a file can be exploited by attackers to target vulnerabilities or weaknesses associated with specific software versions.
Knowledge of the software used to create or modify a file can be exploited by attackers to target vulnerabilities or weaknesses associated with specific software versions.
You may be interested in:
Web Security MCQs