Que: ______________ takes advantage if hidden fields that work as the only security measure in some applications.

a. Parameter tampering
b. Data tampering
c. Tampering of network topology
d. Protocol tampering
Answer: Parameter tampering

Leave a Comment