Answer:
Attackers can exploit inadequate access controls at the architectural level by exploiting the lack of proper controls, allowing unauthorized users to access sensitive resources and functionalities, compromising the overall security of the application.
Attackers can exploit inadequate access controls at the architectural level by exploiting the lack of proper controls, allowing unauthorized users to access sensitive resources and functionalities, compromising the overall security of the application.
You may be interested in:
Web Security MCQs