ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 109 - PT0-002 discussion

Report
Export

Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?

A.
HTTPS communication
Answers
A.
HTTPS communication
B.
Public and private keys
Answers
B.
Public and private keys
C.
Password encryption
Answers
C.
Password encryption
D.
Sessions and cookies
Answers
D.
Sessions and cookies
Suggested answer: D
asked 02/10/2024
Jeff Benson
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first