List of questions
Related questions
Question 109 - PT0-002 discussion
Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
A.
HTTPS communication
B.
Public and private keys
C.
Password encryption
D.
Sessions and cookies
Your answer:
0 comments
Sorted by
Leave a comment first