Answer:
Attackers can exploit exposed API endpoints for reconnaissance purposes by identifying potential attack vectors and gathering information about the application.
Attackers can exploit exposed API endpoints for reconnaissance purposes by identifying potential attack vectors and gathering information about the application.
You may be interested in:
Web Security MCQs