List of questions
Related questions
Question 331 - PT0-002 discussion
A penetration tester observes an application enforcing strict access controls. Which of the following would allow the tester to bypass these controls and successfully access the organization's sensitive files?
A.
Remote file inclusion
B.
Cross-site scripting
C.
SQL injection
D.
Insecure direct object references
Your answer:
0 comments
Sorted by
Leave a comment first