Answer:
Attackers can initiate data exfiltration from a compromised web application by exploiting vulnerabilities to transfer sensitive data to an external location.
Attackers can initiate data exfiltration from a compromised web application by exploiting vulnerabilities to transfer sensitive data to an external location.
You may be interested in:
Web Security MCQs