Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
Which of the following should a penetration tester attack to gain control of the state in the HTTP protocol after the user is logged in?
A . HTTPS communication
B. Public and private keys
C. Password encryption
D. Sessions and cookies
Answer: D
Latest PT0-002 Dumps Valid Version with 110 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments